Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

Comparison of different configuration space representations for path planning under combinatorial method

10.11591/ijeecs.v14.i1.pp1-8
Sanjoy Kumar Debnath , Rosli Omar , Nor Badariyah Abdul Latip
The use of autonomous vehicle/robot has been adopted widely to replace human beings in performing dangerous missions in adverse environments. Keeping this in mind, path planning ensures that the autonomous vehicle must safely arrive to its destination with required criteria like lower computation time, shortest travelled path and completeness. There are few kinds of path planning strategies, such as combinatorial method, sampling based method and bio-inspired method. Among them, combinatorial method can accomplish couple of criteria without further adjustment in conventional algorithm. Configuration space provides detailed information about the position of all points in the system and it is the space for all configurations. Therefore, C-space denotes the actual free space zone for the movement of robot and guarantees that the vehicle or robot must not collide with the obstacle. This paper analyses different C-Space representation techniques under combinatorial method based on the past researches and their findings with different criteria such as optimality, completeness, safety, memory uses, real time and computational time etc. Visibility Graph has optimality which is a unique from other
Volume: 14
Issue: 1
Page: 1-8
Publish at: 2019-04-01

Security in wireless sensor networks

10.11591/ijict.v8i1.pp13-18
Bahae Abidi , Abdelillah Jilbab , Mohamed El Haziti
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks, although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
Volume: 8
Issue: 1
Page: 13-18
Publish at: 2019-04-01

The step construction of penalized spline in electrical power load data

10.12928/telkomnika.v17i2.8460
Rezzy Eko; University of Malaysia Caraka , Sakhinah Abu; University of Malaysia Bakar , Gangga; PGRI Adi Buana Surabaya University Anuraga , M. A.; Padjadjaran University Mauludin , Anwardi; UIN Sultan Syarif Kasim Riau Anwardi , Suwito; Universitas Muslim Indonesia Pomalingo , Vidila; Serang University Rosalina
Electricity is one of the most pressing needs for human life. Electricity is required not only for lighting but also to carry out activities of daily life related to activities Social and economic community. The problems is currently a limited supply of electricity resulting in an energy crisis. Electrical power is not storable therefore it is a vital need to make a good electricity demand forecast. According to this, we conducted an analysis based on power load. Given a baseline to this research, we applied penalized splines (P-splines) which led to a powerful and applicable smoothing technique. In this paper, we revealed penalized spline degree 1 (linear) with 8 knots is the best model since it has the lowest GCV (Generelized Cross Validation). This model have become a compelling model to predict electric power load evidenced by of Mean Absolute Percentage Error (MAPE=0.013) less than 10%.
Volume: 17
Issue: 2
Page: 1023-1031
Publish at: 2019-04-01

New design of lightweight authentication protocol in wearable technology

10.12928/telkomnika.v17i2.10344
Galih Bangun; Sekolah Tinggi Sandi Negara Santosa , Setiyo; Universitas Mercu Buana Budiyanto
Today, the use of wearable devices is becoming a thing inherent in the daily activities of urban communities. In practice, wearable communications may contain sensitive information regarding a user's health record, so authentication and confidentiality of data exchanged must be guaranteed. In addition, the success of authentication between users, wearable devices and smartphones is very important because there are various threats of attack on the authentication process. Based on previous studies, it was found that the security functionality of user impersonation attack is not owned by lightweight authentication protocols in the current wearable communication environment. So this research undertakes the design of a lightweight authentication protocol to be immune to user impersonation attacks to supplement the lack of security functionality in previous protocols with the support of performing a formal analysis using the Scyther Tool. The research method used is a Research Library supported by conducting protocol security test experiment. The developed protocol utilizes a modified and customized S-NCI key establishment protocol scheme to meet all targeted security functionality. The research resulted that the lightweight authentication protocol generated was immune to the impersonation attacks of users, then was able to add two new functionalities that added wearable devices and added smartphones.
Volume: 17
Issue: 2
Page: 561-572
Publish at: 2019-04-01

Memristor based ring oscillators true random number generator with different window functions for applications in cryptography

10.11591/ijeecs.v14.i1.pp201-209
Noor Alia Nor Hashim , Julius Teo Han Loong , Azrul Ghazali , Fazrena Azlee Hamid
Cryptographic applications require numbers that are random and pseudorandom. Keys must be produced in a random manner in order to be used in common cryptosystems. Random or pseudorandom inputs at different terminals are also required in a lot of cryptographic protocols. For example, producing digital signatures using supporting quantities or in verification procedures that requires generating challenges. Random number generation is an important part of cryptography because there are flaws in random number generation that can be taken advantage by attackers that compromised encryption systems that are algorithmically secure. True random number generators (TRNGs) are the best in producing random numbers. This paper presents a True Random Number Generator that uses memristor based ring oscillators in the design. The designs are implemented in 0.18 µm complementary metal oxide semiconductor (CMOS) technology using LT SPICE IV. Different window functions for the memristor model was applied to the TRNG and compared. Statistical tests results of the output random numbers produced showed that the proposed TRNG design can produce random output regardless of the window function.
Volume: 14
Issue: 1
Page: 201-209
Publish at: 2019-04-01

Wi-Fi password stealing program using USB rubber ducky

10.12928/telkomnika.v17i2.11775
Hansen Edrick; Universitas Multimedia Nusantara Harianto , Dennis; Universitas Multimedia Nusantara Gunawan
A minute is all it takes for a hacker to gain informations from your computer, such as Wi-Fi password. Due to the limited capability of people to remember a lot of complex and unique password, people tend to use the same password for most of their account. This paper aimed to implement Wi-Fi password stealing program in USB Rubber Ducky using USB Rubber Ducky Scripting, Visual Basic Script, Web Server, Command Prompt, and Ducky Toolkit to obtain clear text Wi-Fi password that ever connected to the computer. In the testing phase, the success rate of Wi-Fi password stealing program reached 94.28% with 87.87% obtained personal password is still categorized as guessable password and the password reuse rate reached 81.81%. Thus, Wi-Fi password stealing program can be very dangerous as most of the personal password was used in lots of account and still categorized as guessable.
Volume: 17
Issue: 2
Page: 745-752
Publish at: 2019-04-01

Interface design features of mobile application for senior citizens

10.11591/ijeecs.v14.i1.pp436-442
Natrah Abdullah , Nur Farahin binti Abdul Hamid
Reading Al-Quran is one of spiritual activities and as for Muslims, and they believed God would reward those who read and practice it. In order to dedicate remaining years of their life to God and to bring peace of mind, most of the senior citizens are spending their time doing spiritual activities such as reciting Al-Quran. With the advancement of technology, the sources of Al-Quran are also changing. There are many Al-Quran application being developed in the market and can be download and install easily in mobile devices such as smartphone. However, the application that have been developed often ignored needs and limitation of senior users, that causing them to feel unease to use the mobile application. Hence, the purpose of this study is to investigate the user interface design principles of mobile Al-Quran application for senior citizens. For this purpose, the study has conducted a literature review, interview session usability study, the user interface design principles were identified. Using the principles, this study proposed a mobile application and an observation has been conducted with the senior citizens as a validation of the principles. Validation is based on usability evaluation on effectiveness, efficiency and satisfaction. The results show that the application is satisfactory and usable for the users. In future, the same research interest researcher can explore the audio and navigating in the interface by audio commands. The prototype could be extended to meet the needs of senior citizens that having the problem such as Parkinson and Alzheimer disease.
Volume: 14
Issue: 1
Page: 436-442
Publish at: 2019-04-01

Adomian decomposition method for analytical solution of a continuous arithmetic Asian option pricing model

10.12928/telkomnika.v17i2.9179
S. O.; Covenant University Edeki , G. O.; Covenant University Akinlabi , O.; Universidad Autonóma Metropolitana-Cuajimalpa, Cuajimalpa González-Gaxiola
One of the main issues of concern in financial mathematics has been a viable method for obtaining analytical solutions of the Black-Scholes model associated with Arithmetic Asian Option (AAO). In this paper, a proposed semi-analytical technique: Adomian Decomposition Method (ADM) is applied for the first time, for analytical solution of a continuous arithmetic Asian option model. The ADM gives the solution in explicit form with few iterations. The computational work involved is less. However, high level of accuracy is not neglected. The obtained solution conforms with those of Rogers and Shi (J. of Applied Probability 32: 1995, 1077-1088), and Elshegmani and Ahmad (ScienceAsia, 39S: 2013, 67–69). Thus, the proposed method is highly recommended for analytical solution of other versions of Asian option pricing models such as the geometric form for puts and calls, even in their time-fractional forms.
Volume: 17
Issue: 2
Page: 866-872
Publish at: 2019-04-01

Modelling and predicting wetland rice production using support vector regression

10.12928/telkomnika.v17i2.10145
Muhammad; Universitas Lambung Mangkurat Alkaff , Husnul; Universitas Lambung Mangkurat Khatimi , Wenny; Universitas Lambung Mangkurat Puspita , Yuslena; Universitas Lambung Mangkurat Sari
Food security is still one of the main issues faced by Indonesia due to its large population. Rice as a staple food in Indonesia has experienced a decline in production caused by unpredictable climate change. In dealing with climate change, adaptation to fluctuating rice productivity must be made. This study aims to build a prediction model of wetland rice production on climate change in South Kalimantan Province which is one of the national rice granary province and the number one rice producer in Kalimantan Island. This study uses monthly climatic data from Syamsudin Noor Meteorological Station and quarterly wetland rice production data from Central Bureau of Statistics of South Kalimantan. In this research, Support Vector Regression (SVR) method is used to model the effect of climate change on wetland rice production in South Kalimantan. The model is then used to predict the amount of wetland rice production in South Kalimantan. The results showed that the prediction model with the RBF kernel with the parameter of C=1.0, epsilon=0.002 and gamma=0.2 produces good results with the RMSE value of 0.1392.
Volume: 17
Issue: 2
Page: 819-825
Publish at: 2019-04-01

Improved echocardiography segmentation using active shape model and optical flow

10.12928/telkomnika.v17i2.11821
Riyanto; Politeknik Elektronika Negeri Surabaya Sigit , Calvin Alfa; Politeknik Elektronika Negeri Surabaya Roji , Tri; Politeknik Elektronika Negeri Surabaya Harsono , Son; Politeknik Elektronika Negeri Surabaya Kuswadi
Heart disease is one of the most dangerous diseases that threaten human life. The doctor uses echocardiography to analyze heart disease. The result of echocardiography test is a video that shows the movement of the heart rate. The result of echocardiography test indicates whether the patient’s heart is normal or not by identifying a heart cavity area. Commonly it is determined by a doctor based on his own accuracy and experience. Therefore, many methods to do heart segmentation is appearing. But, the methods are a bit slow and less precise. Thus, a system that can help the doctor to analyze it better is needed. This research will develop a system that can analyze the heart rate-motion and automatically measure heart cavity area better than the existing method. This paper proposes an improved system for cardiac segmentation using median high boost filter to increase image quality, followed by the use of an active shape model and optical flow. The segmentation of the heart rate-motion and auto measurement of the heart cavity area is expected to help the doctor to analyze the condition of the patient with better accuracy. Experimental result validated our approach.
Volume: 17
Issue: 2
Page: 809-818
Publish at: 2019-04-01

Research on neutral-point potential control of a three-level inverter

10.11591/ijeecs.v14.i1.pp20-28
Guangjie Fu , Xinpeng Li
Diode-clamped three-level inverters have been widely used in high voltage and high power fields because of their unique advantages. Nowadays, diode-clamped three-level inverters have become a research hotspot. In order to reduce the content of energy harmonics injected into the power grid by the inverter system, the neutral point potential needs to be controlled. This paper proposes a control method based on a proportional controller. The voltage sector was redefined and the design of the proportional controller was completed. In combination with the introduction of a new PWM technology, a smooth control of the midpoint potential was achieved. The effectiveness of the method is verified by simulation in MATLAB
Volume: 14
Issue: 1
Page: 20-28
Publish at: 2019-04-01

A decentralized paradigm for resource-aware computing in wireless Ad hoc networks

10.12928/telkomnika.v17i2.9621
Heerok; SRM Institute of Science and Technology Banerjee , S.; SRM Institute of Science and Technology Murugaanandam , V.; SRM Institute of Science and Technology Ganapathy
A key factor limiting the democratisation of networked systems is the lack of trust, particularly in the wake of data-intensive applications that work on sensitive and private data, which requires providing strong network security guarantees via encryption and authentication algorithms, as well as rethinking algorithms to compute on the network peripheries without moving data. In many security and privacy-critical domains such as Home Automation IoT networks, AUV networks etc., the existence of a centralized privileged node leads to a vulnerability for leakage of sensitive information. In this paper, we have proposed a decentralized networking architecture that adopts collaborative processing techniques and operates within the tradeoff between network security and performance. We have investigated the design and sustainability of autonomous decentralized systems and evaluated the efficiency of the proposed scheme with the help of extensive simulation tools.
Volume: 17
Issue: 2
Page: 676-682
Publish at: 2019-04-01

Electronically controlled radiation pattern leaky wave antenna array for (C band) application

10.12928/telkomnika.v17i2.11126
Mowafak K.; Universiti Teknikal Malaysia Melaka (UTeM) Mohsen , M. S. M.; Universiti Teknikal Malaysia Melaka (UTeM) Isa , Z.; Universiti Teknikal Malaysia Melaka (UTeM) Zakaria , A. A. M.; Universiti Teknikal Malaysia Melaka (UTeM) Isa , M. K.; Universiti Teknikal Malaysia Melaka (UTeM) Abdulhameed , Mothana L.; Universiti Teknikal Malaysia Melaka (UTeM) Attiah , Ahmed M.; Universiti Teknikal Malaysia Melaka (UTeM) Dinar
This paper provides an insight of a new, leaky-wave antenna (LWA) array. It holds the ability to digitally steer its beam at a fixed frequency by utilizing only two state of bias voltage. This is done with acceptable impedance matching while scanning and very little gain variation. Investigation is carried out on LWAs’ control radiation pattern in steps at a fixed frequency via PIN diodes switches. This study also presents a novel half-width microstrip LWA (HWMLWA) array. The antenna is made up of the following basic structures: two elements and reconfigurable control cell with each being comprised of two diodes and two triangle patches. A double gap capacitor in each unit cell is independently disconnected or connected via PIN diode switch to achieve fixed-frequency control radiation pattern. The reactance profile at the microstrip’s free edge and thus the main beam direction is changed once the control-cell states are changed. The main beam may be directed by the antenna between 61o and 19o at 4.2 GHz. C band achieved the measured peak gain of the antenna of 15 dBi at 4.2 GHz beam scanning range.
Volume: 17
Issue: 2
Page: 573-579
Publish at: 2019-04-01

Improved Hunting Search Algorithm for the Quadratic Assignment Problem

10.11591/ijeecs.v14.i1.pp143-154
Amine Agharghor , Mohammed Essaid Riffi , Fayçal Chebihi
Nowadays, the metaheuristics are the most studied methods used to solve the hard optimization problems. Hunting Search algorithm is a metaheuristic inspired by the method of group hunting of predatory animals like wolves. Created for solving continuous optimization problems, recently, it is adapted and evaluated to solve hard combinatorial optimization problems. This paper proposes an improved hunting search algorithm to solve the quadratic assignment problem. No local search method is used. To evaluate the performances of this work, the improved Hunting Search is checked on a set of 36 instances of QAPLib and it outperforms the results obtained by the well-known metaheuristics.
Volume: 14
Issue: 1
Page: 143-154
Publish at: 2019-04-01

Development of IoT at hydroponic system using raspberry Pi

10.12928/telkomnika.v17i2.9265
Rony Baskoro; Bina Nusantara University Lukito , Cahya; Bina Nusantara University Lukito
Hydroponics is one of the farming technologies using water media to meet the needs of plant nutrition. Water use in hydroponics systems more efficient compared with the cultivation system using soil media. Water that has been mixed with mineral nutrients needed by plants streamed continuously to the plant roots. Another advantage of this method is very suitable to be applied in a limited area such as urban home environments, the use of the existing space in the house. In the everyday activities of urban residents spending more time outside the home to work, school, shopping and other activities. Thus the observation of hydroponic systems remotely be important to be done from anywhere. Availability, temperature, and pH of the water are some of the factors in hydroponic systems that need to be observed periodically to determine the appropriate action. This problem can be solved by developing the Internet of Things technology in the hydroponic system that observations can be done remotely and reported directly through the Internet.
Volume: 17
Issue: 2
Page: 897-906
Publish at: 2019-04-01
Show 1310 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration