Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,762 Article Results

An Efficient Cloud Scheduling Algorithm for the Conservation of Energy through Broadcasting

10.11591/ijece.v8i1.pp179-188
Kavita Arjun Sultanpure , Abhishek Gupta , L. S. S. Reddy
Method of broadcasting is the well known operation that is used for providing support to different computing protocols in cloud computing. Attaining energy efficiency is one of the prominent challenges, that is quite significant in the scheduling process that is used in cloud computing as, there are fixed limits that have to be met by the system. In this research paper, we are particularly focusing on the cloud server maintenance and scheduling process and to do so, we are using the interactive broadcasting energy efficient computing technique along with the cloud computing server. Additionally, the remote host machines used for cloud services are dissipating more power and with that they are consuming more and more energy. The effect of the power consumption is one of the main factors for determining the cost of the computing resources. With the idea of using the avoidance technology for assigning the data center resources that dynamically depend on the application demands and supports the cloud computing with the optimization of the servers in use.
Volume: 8
Issue: 1
Page: 179-188
Publish at: 2018-02-01

Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Using Elliptic Curve Cryptography (ECC)

10.12928/telkomnika.v16i1.6953
Dicky; STMIK Triguna Dharma Nofriansyah , Afzalur; STMIK Triguna Dharma Syaref , Widiarti; STMIK Triguna Dharma R Maya , Ganefri; Universitas Negeri Padang Ganefri , Ridwan; Universitas Negeri Padang Ridwan
Cryptography is a growing science of data security. The integrity of a data is an important thing to keep the secrets contained in the data. In this research will be visualized the efficient quantities that use elliptic curves and do not use them. The Elgamal method is an asymmetric cryptographic algorithm whose complexity of processes. It is especially for digital signatures. This research will discuss about the use of ECC to optimize and streamline the Encryption and Decryption process in particular 128-bit Elgamal method. The hope is that by using elliptic curves the timing of the encryption and decryption process can run faster in the computation of Elgamal Method.
Volume: 16
Issue: 1
Page: 352-360
Publish at: 2018-02-01

Development and Performance Enhancement of MEMS Helix Antenna for THz Applications using 3D HFSS-based Efficient Electromagnetic Optimization

10.12928/telkomnika.v16i1.8000
Abdelhakim; University of Tlemcen Boudkhil , Mohammed; University of Tlemcen Chetloul , Nadia; University of Tlemcen Benabdellah , Nasreddine; University of Tlemcen Benahmed
Interest of Micro-Electromechanical System (MEMS) antennas in Terahertz (THz) applications has rapidly expanded in recent years due to the advent of accurate Computer Aided Design (CAD) tools. The very special needs of newly proposed MEMS antennas, especially with a wide bandwidth range, require advanced optimization procedures of enhancing already established designs. This paper provides a compact design of a wideband MEMS helix antenna optimized using tree-dimensional High Frequency Structure Simulator (3D-HFSS) based on Quasi-Newton (Q-N) and Sequential Non Linear Programming (SNLP) techniques to modify the antenna structure with a high accuracy for the selective band of frequencies by training the samples and minimizing the error from Finite Element Method- (FEM) based simulation tool. The helix antenna is presented using MEMS technology and shows high performance demonstrated by very low return losses of less than -20 to -65 dB for a wide range of frequencies from 2.5 to 5 THz. High antenna geometry precision and efficient performance are finally achieved by rectifying and synthesizing various tunable parameters embedded in silicon substrate including both helix form and feeding line parameters.
Volume: 16
Issue: 1
Page: 210-216
Publish at: 2018-02-01

OFET Preparation by Lithography and Thin Film Depositions Process

10.12928/telkomnika.v16i1.6544
Sujarwata; Universitas Negeri Semarang Sujarwata , Fianti; Universitas Negeri Semarang Fianti , Langlang; Universitas Negeri Semarang Handayani , Aji; Universitas Negeri Semarang Kampus Sekaran Gunungpati Semarang Purwinarko , Susilo; Universitas Negeri Semarang Susilo
The length of the channel OFET based thin film is determined during preparation takes place using the technique of lithography and mask during the metal deposition process. The lithography technique is the basic process steps in the manufacture of semiconductor devices. Lithography is the process of moving geometric shapes mask pattern to a thin film of material that is sensitive to light. The pattern of geometric shapes on a mask has specifications, as follows: long-distance source and drain channels varied, i.e. 100 μm, the width of the source and drain are made permanent. Bottom contact OFET structure has been created using a combination of lithography and thin film deposition processes.
Volume: 16
Issue: 1
Page: 77-83
Publish at: 2018-02-01

Low Complexity Multi-User MIMO Detection for Uplink SCMA System Using Expectation Propagation Algorithm

10.12928/telkomnika.v16i1.7365
Alva; University of Brawijaya Kosasih , Onny; University of Brawijaya Setyawati , Rahmadwati; University of Brawijaya Rahmadwati
Sparse code multiple access (SCMA), which combines the advantages of low density signature (LDS) and code-division multiple access (CDMA), is regarded as one of the promising modulation technique candidate for the next generation of wireless systems. Conventionally, the message passing algorithm (MPA) is used for data detector at the receiver side. However, the MPA-SCMA cannot be implemented in the next generation wireless systems, because of its unacceptable complexity cost. Specifically, the complexity of MPA-SCMA grows exponentially with the number of antennas. Considering the use of high dimensional systems in the next generation of wireless systems, such as massive multi-user MIMO systems, the conventional MPA-SCMA is prohibitive. In this paper, we propose a low complexity detector algorithm named the expectation propagation algorithm (EPA) for SCMA. Mainly, the EPA-SCMA solves the complexity problem of MPA-SCMA and enables the implementation of SCMA in massive MU-MIMO systems. For instance, the EPA-SCMA also enables the implemantation of SCMA in the next generation wireless systems. We further show that the EPA can achieve the optimal detection performance as the numbers of transmit and receive antennas grow. We also demonstrate that a rotation design in SCMA codebook is unnecessary, which is quite rather different from the general assumption
Volume: 16
Issue: 1
Page: 182-188
Publish at: 2018-02-01

Improving the Performance of Viterbi Decoder using Window System

10.11591/ijece.v8i1.pp611-621
Rekkal Kahina , Abdesselam Bassou
An efficient Viterbi decoder is introduced in this paper; it is called Viterbi decoder with window system. The simulation results, over Gaussian channels, are performed from rate 1/2, 1/3 and 2/3 joined to TCM encoder with memory in order of 2, 3. These results show that the proposed scheme outperforms the classical Viterbi by a gain of 1 dB. On the other hand, we propose a function called RSCPOLY2TRELLIS, for recursive systematic convolutional (RSC) encoder which creates the trellis structure of a recursive systematic convolutional encoder from the matrix “H”. Moreover, we present a comparison between the decoding algorithms of the TCM encoder like Viterbi soft and hard, and the variants of the MAP decoder known as BCJR or forward-backward algorithm which is very performant in decoding TCM, but depends on the size of the code, the memory, and the CPU requirements of the application.
Volume: 8
Issue: 1
Page: 611-621
Publish at: 2018-02-01

Computer Aided Diagnosis for Screening the Shape and Size of Leukocyte Cell Nucleus based on Morphological Image

10.11591/ijece.v8i1.pp150-158
Retno Supriyanti , Alfin Chrisanty , Yogi Ramadhani , Wahyu Siswandari
Hematology tests are examinations that aim to know the state of blood and its components, one of which is leukocytes. Hematologic examinations such as the number and morphology of blood generally still done manually, especially by a specialist pathologist. Despite the fact that today there is equipment that can identify morphological automatically, but for developing countries like Indonesia, it can only be done in the capital city. Low accuracy due to the differences identified either by doctors or laboratory staff, makes a great reason to use computer assistance, especially with the rapid technological developments at this time. In this paper, we will emphasize our experiment to screen leucocyte cell nucleus by identifying the contours of the cell nucleus, diameter, circumference and area of these cells based on digital image processing techniques, especially using the morphological image. The results obtained are promising for further development in the development of computer-aided diagnosis for identification of leukocytes based on a simple and inexpensive equipment.
Volume: 8
Issue: 1
Page: 150-158
Publish at: 2018-02-01

Optimal Expenditure and Benefit Cost Based Location, Size and Type of DGs in Microgrids Systems Using Adaptive Real Coded Genetic Algorithm

10.12928/telkomnika.v16i1.6761
Umar; Institut Teknologi Sepuluh Nopember Umar , Firdaus; Institut Teknologi Sepuluh Nopember Firdaus , Adi; Institut Teknologi Sepuluh Nopember Soeprijanto , Ontoseno; Institut Teknologi Sepuluh Nopember Penangsang
The economic issue is an essential element to determine whether DG should be installed or not. This work presents the economical approach for multi-type DGs placement in microgrid systems with more comprehensive overview from DG’s owner perspective. Adaptive Real Coded GA (ARC-GA) with replacement process is developed to determine the location, type, and rating of DGs so as the maximum profit is achieved. The objectives of this paper are maximizing benefit cost and minimizing expenditure cost. All objectives are optimized while maintaining the bus voltage at the acceptable range and the DGs penetration levels are below of the DGs capacities.The proposed method is applied on the 33 bus microgrids systems using conventional and renewable DG technology, namely Photovoltaic (PV), Wind Turbine (WT), Micro Turbine (MT) and Gas Turbine (GT). The simulation results show the effectiveness of the proposed approach.
Volume: 16
Issue: 1
Page: 10-17
Publish at: 2018-02-01

A Multiband Printed Antenna Suitable for Wireless Applications

10.12928/telkomnika.v16i1.7059
S.; University of Hassan 1st Settat El Kilani , L. El; University of Hassan 1st Settat Abdellaouib , J.; University of Hassan 1st Settat Zbitou , J.; CRMEF Terhzaz , A.; University of Hassan 1st Settat Errkik , M.; Microwave Group ESEO Angers Latrach
This study deals with a new research work on a low cost multiband printed antenna which can be used for three operating frequency bands GSM900/PCS/WIFI/Bluetooth. The achieved antenna is mounted on an FR-4 substrate. In this study, the solts technique is used to obtain the multiband behavior. The different solts are inserted in the radiator face and the back face that is the ground. The whole circuit is optimized taking into account the good matching of the input impedance in the operating frequency bands with a stable radiation pattern. In order to optimize the proposed antenna structure we have used CST-MW and to compare the obtained simulation results we have conducted another electromagnetic simulation by using HFSS solver. The final circuit validated into simulation has been fabricated and tested which permits to validate the proposed multiband antenna.
Volume: 16
Issue: 1
Page: 159-165
Publish at: 2018-02-01

Household Purposes in A Single Touch Via Bluetooth Using Smartphones

10.11591/ijeecs.v9.i2.pp351-353
Bhavani Rohit , Rengamani J
Technology emerges in our environment day by day. But, still, we lag in keep on using multiple remotes for every device in our homes. Once Bluetooth came up it changes. People started using mobile phones connected to their devices to hear songs wireless and change channels using a mobile phone. A further implementation is kept on moving with multiple remotes for their usage. So, we had an idea that all our household devices may be controlled on our mobile phones via Bluetooth which is cheaper even for urban peoples. Now, all home devices with remote are IR based which doesn't work on sunlight, fluorescent bulbs due to interference. Switch over Bluetooth control reduces remotes in a sense called plastics. Mobile applications are evolved user-friendly to all the people on the day to day lives. Merge those applications to the household devices to control all household devices operated via remote such as TV, DVD, Home theatres, AC, even Table fan etc., Instead of removing IR's just interface Bluetooth chip on those household devices to control every remote device by using your smartphone. Why I am moving to Bluetooth instead of Wi-Fi. Bluetooth is cheaper, advanced to control devices in the range of 50 meters. But IR is useful to 10 meters, and once you block the signal, it will not work.
Volume: 9
Issue: 2
Page: 351-353
Publish at: 2018-02-01

Modified Discrete Firefly Algorithm Combining Genetic Algorithm for Traveling Salesman Problem

10.12928/telkomnika.v16i1.4752
Ling; Shenyang Normal University Teng , Hang; Shenyang Normal University Li
The Firefly Algorithm (FA) has a few disadvantages in solving the constrained global optimization problem, including that it is difficult to produce initial population, the size of relative attractiveness has nothing to do with the absolute brightness of fireflies, the inertia weight does not take full advantage of the information of objective function, and it cannot better control and constrain the mobile distance of firefly. In this paper, we propose a novel method based on discrete firefly algorithm combining genetic algorithm for traveling salesman problem. We redefine the distance of firefly algorithm by introducing swap operator and swap sequence to avoid algorithm easily falling into local solution and accelerate convergence speed. In addition, we adopt dynamic mechanism based on neighborhood search algorithm. Finally, the comparison experiment results show that the novel algorithm can search perfect solution within a short time, and greatly improve the effectiveness of solving the traveling salesman problem, it also significantly improves computing speed and reduces iteration number.
Volume: 16
Issue: 1
Page: 424-431
Publish at: 2018-02-01

Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual Cryptography for Security of Handwritten Images

10.12928/telkomnika.v16i1.6632
Sugianto; Institute of Business Development Indonesia Sugianto , Suharjito; Bina Nusantara University Suharjito , Nico; Bina Nusantara University Surantha
The secret sharing is a method to protect confidentiality and integrity of the secret messages by distributing the message shares into several recipients. The secret message could not be revealed unless the recipients exchange and collect shares to reconstruct the actual message. Even though the attacker obtain shares shadow during the share exchange, it would be impossible for the attacker to understand the correct share. There are few algorithms have been developed for secret sharing, e.g. secret splitting, Asmuth-Bloom secret sharing protocol, visual cryptography, etc. There is an unanswered question in this research about which method provides best level of security and efficiency in securing message. In this paper, we evaluate the performance of three methods, i.e. secret splitting, secret sharing, and recursive threshold visual cryptography for handwritten image security in terms of execution time and mean squared error (MSE) simulation. Simulation results show the secret splitting algorithm produces the shortest time of execution. On the other hand, the MSE simulation result that the three methods can reconstruct the original image very well.
Volume: 16
Issue: 1
Page: 323-333
Publish at: 2018-02-01

Probabilistic Self-Organizing Maps for Text-Independent Speaker Identification

10.12928/telkomnika.v16i1.7559
Ayoub; Sidi Mohamed Ben Abdellah University Bouziane , Jamal; Sidi Mohamed Ben Abdellah University Kharroubi , Arsalane; Sidi Mohamed Ben Abdellah University Zarghili
The present paper introduces a novel speaker modeling technique for text-independent speaker identification using probabilistic self-organizing maps (PbSOMs). The basic motivation behind the introduced technique was to combine the self-organizing quality of the self-organizing maps and generative power of Gaussian mixture models. Experimental results show that the introduced modeling technique using probabilistic self-organizing maps significantly outperforms the traditional technique using the classical GMMs and the EM algorithm or its deterministic variant. More precisely, a relative accuracy improvement of roughly 39% has been gained, as well as, a much less sensitivity to the model-parameters initialization has been exhibited by using the introduced speaker modeling technique using probabilistic self-organizing maps.
Volume: 16
Issue: 1
Page: 250-258
Publish at: 2018-02-01

Educational Data Mining and Analysis of Students’ Academic Performance Using WEKA

10.11591/ijeecs.v9.i2.pp447-459
Sadiq Hussain , Neama Abdulaziz Dahan , Fadl Mutaher Ba-Alwi , Najoua Ribata
In this competitive scenario of the educational system, the higher education institutes use data mining tools and techniques for academic improvement of the student performance and to prevent drop out. The authors collected data from three colleges of Assam, India. The data consists of socio-economic, demographic as well as academic information of three hundred students with twenty-four attributes. Four classification methods, the J48, PART, Random Forest and Bayes Network Classifiers were used. The data mining tool used was WEKA. The high influential attributes were selected using the tool. The internal assessment attribute in the continuous evaluation process makes the highest impact in the final semester results of the students in our dataset.  The results showed that random forest outperforms the other classifiers based on accuracy and classifier errors. Apriori algorithm was also used to find the association rule mining among all the attributes and the best rules were also displayed.
Volume: 9
Issue: 2
Page: 447-459
Publish at: 2018-02-01

Rank Computation Model for Distribution Product in Fuzzy Multiple Attribute Decision Making

10.12928/telkomnika.v16i1.6392
Syafariani R.; Indonesia Computer University Fenny , A.; Indonesia Computer University Nursikuwagus , Tono; Indonesia Computer University Hartono
Ranking of an activity is very important to support work effectiveness. Previous works, ranking for distribution product is used by manual process or averaging value. Problem in this research, the research should be found the effective way to rank the distribution product. This research proposes assist the ranking with a computational model based on Fuzzy Multiple Decision Making (FMADM). Getting an effective ranking, a variable in FMADM computing is required. Variables is used in this research such as number of households, number of small-scale enterprises run by households, gross domestic regional income, and economic growth rate of a region. Research completion is assisted by using self-built research methods. Research method consists of determining value of origin, determining degree of membership, determining weight of each variable, calculation of relation matrix, calculation of the preference value in each village for ranking value, and last is sorting. Operationalized FMADM is gain a result with three priorities district. Priority number one is all of district that have a rank or Vij (alternative rank) higher than 0.4. It means only 7% or 5 villages with the highest rank. Priority number second s all of district that have rank between Vij = 0.26 and Vij = 0.4. It means only 62% or 44 villages. Priority number three is district that have a rank lower than Vij = 0.26, and only 31% or 22 villages. Impact in use of FMADM, calculated in rank, is the process runs effective and dynamic with changing of weighted. User can arrange of weighted as needed.
Volume: 16
Issue: 1
Page: 274-281
Publish at: 2018-02-01
Show 1347 of 1851

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration