Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

Improvement of Auto-Tracking Mobile Robot based on HSI Color Model

10.11591/ijeecs.v12.i3.pp1349-1357
Suresh Sundarajoo , Ahmad Shahrizan Abdul Ghani
Auto tracking mobile robot is a device that able to detect and track a target. For an auto tracking device, the most crucial part of the system is the object identification and tracking of the moving targets. In order to improve the accuracy of identification of object in different illumination and background conditions, the implementation of HSI color model is used in image processing algorithm. In this project HSI-based color filtering algorithm were used for object identification. This is because HSI parameter are more stable in different light and background conditions, so it is selected as the main parameters of this system. Pixy CMUcam5 is used as the vision sensor while Arduino Uno as the main microcontroller that controls all the input and output of the device. Besides that, L293D is used as the motor driver to control the movement of two DC motors that attached to the wheel of the robot. Moreover, two servo motors were used to control the pan-tilt movement of the vision sensor. Experimental results demonstrate that when HSI color-based filtering algorithm is applied to visual tracking it improves the accuracy and stability of tracking under the condition of varying brightness, or even in the low-light-level environment. Besides that, this algorithm also prevents tracking loss due to object color appears in the background.
Volume: 12
Issue: 3
Page: 1349-1357
Publish at: 2018-12-01

Numerical Method for Evaluating E-Cash Security

10.12928/telkomnika.v16i6.9811
Dany Eka; Bandung Institute of Technology Saputra , Sarwono; Bandung Institute of Technology Sutikno , Suhono Harso; Bandung Institute of Technology Supangkat
Security evaluations of electronic cash (e-cash) schemes usually produce an abstract result in the form of a logical proof. This paper proposes a new method of security evaluation that produces a quantitative result. The evaluation is done by analyzing the protocol in the scheme using the Markov chain technique. This method calculates the probability of an attack that could be executed perfectly in the scheme’s protocol. As proof of the effectiveness of our evaluation method, we evaluated the security of Chaum’s untraceable electronic cash scheme. The result of our evaluation was compared to the evaluation result from the pi-calculus method. Both methods produced comparable results; and thus, both could be used as alternative methods for evaluating e-cash security.
Volume: 16
Issue: 6
Page: 2668-2675
Publish at: 2018-12-01

Proposed Model for Interference Estimation in Code Division Multiple Access

10.12928/telkomnika.v16i6.10330
Dalal Kanaan; Al-Mustansiryah University Taher , Adheed Hassan; Al-Mustansiryah University Sallomi
Cellular CDMA systems are usually affected by interference experienced by users in adjacent cells that decrease the Quality of Services in wireless communication network. Hence, interference is the limiting factor of capacity in CDMA cellular and it is one of the problems fighting against the high efficiency of any mobile network. In this paper, a mathematical model to estimate the average number of users contributing in inter-cell interference at the busy hours of CDMA network is proposed. As the power exponent value has significant affect on interferer signal attenuation and hence other-cells interference, measurements were carried through a drive test to determine the received power level at various distance from CDMA base stations at Baghdad. The results obtained show that the power exponent was 2.71. This value was applied in dual-slop path loss model to determine the expected interference factor, and the number of users that can be hold at each cell. Simulations showed that users at a boundary cell generate more interference than those close to the base station. Furthermore, it was denoted that greater number of users caused to increase the interference factor, and greater power exponent value result in interference factor reduction.
Volume: 16
Issue: 6
Page: 2549-2556
Publish at: 2018-12-01

A Novel Structure of a Wideband Zero-Bias Power Limiter for ISM Band

10.12928/telkomnika.v16i6.8730
Khalifa; Hassan 1st University Echchakhaoui , Elhassane; Hassan 1st University Abdelmounim , Jamal; Hassan 1st University Zbitou , Hamid; Moulay Ismail University Bennis , Ahmed; Hassan 1st University Errkik , Angel Mediavilla; University of Cantabria Santander Sanchez
In this paper, a new broadband microwave microstrip power limiter is designed and realized. The Power Limiter is based on microstrip technology integrating a Zero Bias commercial Schottky diodes HSMS2820.The power limiter is optimized and validated in two steps. The enhanced and achieved circuit is obtained by concatenating two basic structures. The final circuit was validated into simulation by using ADS solver. Finally this circuit was realized and tested. Simulation and measurement results are in a good agreement. The final circuit achieves a limiting rate of 14 dB with a threshold input power level of 0 dBm until a maximum input power level of 30 dBm.
Volume: 16
Issue: 6
Page: 2481-2491
Publish at: 2018-12-01

Modified DCT-based Audio Watermarking Optimization using Genetics Algorithm

10.12928/telkomnika.v16i6.10111
Ledya; Telkom University Novamizanti , Gelar; Telkom University Budiman , Irma; Telkom University Safitri
Ease process digital data information exchange impact on the increase in cases of copyright infringement. Audio watermarking is one solution in providing protection for the owner of the work. This research aims to optimize the insertion parameters on Modified Discrete Cosine Transform (M-DCT) based audio watermarking using a genetic algorithm, to produce better audio resistance. MDCT is applied after reading host audio, then embedding in MDCT domain is applied by Quantization Index Modulation (QIM) technique. Insertion within the MDCT domain is capable of generating a high imperceptible watermarked audio due to its overlapping frame system. The system is optimized using genetic algorithms to improve the value of imperceptibility and robustness in audio watermarking. In this research, the average SNR reaches 20 dB, and ODG reaches -0.062. The subjective quality testing on the system obtains an average MOS of 4.22 out of five songs tested. In addition, the system is able to withstand several attacks. The use of M-DCT in audio watermaking is capable of producing excellent imperceptibility and better watermark robustness.
Volume: 16
Issue: 6
Page: 2651-2660
Publish at: 2018-12-01

Integrated Analytical Hierarchy Process and Objective Matrix in Balanced Scorecard Dashboard Model for Performance Measurement

10.12928/telkomnika.v16i6.9648
Okfalisa; Sultan Syarif Kasim State Islamic University of Riau Okfalisa , Septia; Sultan Syarif Kasim State Islamic University of Riau Anugrah , Wresni; Sultan Syarif Kasim State Islamic University of Riau Anggraini , Muhammad; Sultan Azlan Shah University Malaysia Absor , S.S.M.; Universiti Teknologi MARA Fauzi , Saktioto; Universitas Riau Saktioto
Measuring organizational performance is pivotal for a comprehensive understanding of strengths, weaknesses and to improve the quality of any organization’s performance. Balanced Scorecard (BSC) is the strategic evolution tool that is widely used to measure the organizational performances, and achievements from various aspects, both financial and non-financial. In this research, BSC was not only a straight jacket concept but also a high potential tool for measuring and managing tangible and accurate data through the application of several methods. This research weighted the variables of BSC based on significance values of Analytical Hierarchy Process (AHP) and Optimization of Measurement with Objective Matrix (OMAX). Moreover, a recommendation analysis was given based on the cause and effect analysis of variables and the achievement of Key Performance Indicators (KPIs). The flow of information, data, and performance measurement processes were designed into Business Intelligence (BI) software development i.e. BI-MonevDash. The framework and software BI-MonevDash proposed can be used as a new chosen tool for measuring and monitoring organizational performance. Recommendations could facilitate the leaders in decision making to improve the organizational performance and reduce risks.
Volume: 16
Issue: 6
Page: 2703-2711
Publish at: 2018-12-01

Anomaly Detection based on Control-flow Pattern of Parallel Business Processes

10.12928/telkomnika.v16i6.10568
Hendra; Institut Teknologi Sepuluh Nopember Darmawan , Riyanarto; Institut Teknologi Sepuluh Nopember Sarno , Adhatus Solichah; Institut Teknologi Sepuluh Nopember Ahmadiyah , Kelly Rossa; Institut Teknologi Sepuluh Nopember Sungkono , Cahyaningtyas Sekar; Institut Teknologi Sepuluh Nopember Wahyuni
The purpose of this paper was to discover an anomalous-free business process model from event logs. The process discovery was conducted using a graph database, specifically using Neo4J tool involving trace clustering and data filtering processes. We also developed a control-flow pattern to address, AND relation between activities named parallel business process. The result showed that the proposed method improved the precision value of the generated business process model from 0.64 to 0.81 compared to the existing algorithm. The better outcome is constructed by applying trace clustering and data filtering to remove the anomaly on the event log as well as discovering parallel (AND) relation between activities.
Volume: 16
Issue: 6
Page: 2809-2816
Publish at: 2018-12-01

Multiuser Detection with Decision-Feedback Detectors and PIC in MC-CDMA System

10.12928/telkomnika.v16i6.9448
Leila; Badji Mokhtar University Sahraoui , Djemil; Badji Mokhtar University Messadeg , Saliha e; Badji Mokhtar University Hariz , Noureddine; Badji Mokhtar University Doghmane
In this paper we propose an iterative parallel decision feedback (P-DF) receivers associated with parallel interference cancellation (PIC) for multicarrier code division multiple access (MC-CDMA) systems in a Rayleigh fading channel (cost 207). First the most widely detection techniques, minimum mean-squared error MMSE, Maximum Likelihood ML and PIC were investigated in order to compare their performances in terms of Bit Error Rate (BER) with parallel feedback detection P-DFD. A MMSE DF detector that employs parallel decision-feedback (MMSE-P-DFD) is considered and shows almost the same BER performance with MMSE and ML, which present a better result than the other techniques. In a second time, an iterative proposed method based on the multi-stage techniques P-DFD (parallel DFD with two stages) and PIC was exploited to improve the performance of the system.
Volume: 16
Issue: 6
Page: 2578-2587
Publish at: 2018-12-01

Loss Quantization of Reflectarray Antenna Based on Organic Substrate Materials

10.12928/telkomnika.v16i6.9968
H. I; University Tun Hussein Onn Malaysia Malik , M. Y; Universiti Tun Hussein Onn Malaysia Ismail , Sharmiza; Forest Research Institute Malaysia Adnan , S. R; Forest Research Institute Malaysia Masrol
This paper presents novel loss quantization of reflectarray elements based on organic substrate materials. Three differently composed substrate materials derived from recycled materials have been characterized for their dielectric properties using a broadband analysis technique. The materials show low dielectric permittivity values of 1.81, 1.62 and 1.84 for X-band frequency range. In order to estimate the reflection loss of for the three substrates a mathematical relation has been established using empirical data generated by computer simulated models. The reliability of the proposed model has been established by simulation and fabrication of unit reflectarray rectangular patch elements on three proposed substrate substrates. A broadband frequency response has been depicted by scattering parameter analysis of unit elements with 10% fractional bandwidth of 312, 340 and 207 MHz for RCP50, RCR75 and RNP50 substrate respectively.
Volume: 16
Issue: 6
Page: 2570-2577
Publish at: 2018-12-01

Integration of Linux Containers in OpenStack: An Introspection

10.11591/ijeecs.v12.i3.pp1094-1105
Ashish Lingayat , Ranjana R. Badre , Anil Kumar Gupta
In cloud computing, sharing of resources is supported using heavy weighted traditional virtualization techniques. Such techniques involve hypervisors to emulate hardware for creating virtual machines. The inclusion of an additional layer of hypervisor over host operating system depreciates the performance of the virtual machine. Recent evolution is a lightweight alternative to the virtual machine called containers which have gainedpopularity among developers and administrators. Container Based virtualization has proven very efficient regarding performance, and many industries are now migrating their virtualized environment to run on Linux containers. Containers use host operating systems kernel and isolate each container by encapsulating them with their required services and packages. Linux kernel is very beneficial in implementing containers, which is the reason for the existence of Linux containers. Linux containers utilize less storage space and consume optimal computational power, giving a hike in performance. Having them integrated into the cloud surely benefits consumer and cloud provider. Many projects have extended their support in incorporating containers in the cloud. In this paper, we will discuss various Linux containers and their management tools along with cloud computing software, OpenStack, including projects undertaken by OpenStack for integrating containers in the cloud.
Volume: 12
Issue: 3
Page: 1094-1105
Publish at: 2018-12-01

RS Codes for Downlink LTE System over LTE-MIMO Channel

10.12928/telkomnika.v16i6.9177
Ghasan Ali; Universiti Tun Hussein Onn Malaysia Hussain , Lukman; Universiti Tun Hussein Onn Malaysia Audah
Nowdays, different applications require a modern generation of mobile communication systems; long term evolution (LTE) is a candidate to achieve this purpose. One important challenge in wireless communications, including LTE systems, is the suitable techniques of controlling errors that degrade system performance in transmission systems over multipath fading channels. Different forward Error correction (FEC) techniqes are required to improve the robustness of transmission channels. In this paper, Reed-Solomon (RS) codes were used with a downlink LTE system over a LTE-MIMO channel. This research contributes by combining RS codes that have low decoding complexity (by using hard decision decoding) with a LTE-MIMO channel to improve downlink LTE system performance. The results show that using RS codes clearly improves LTE system performance and thus decreases Bit Error Rates (BER) more than convolutional and turbo codes which have high decoding complexity. Lastly, the results show also extra improvements of downlink LTE system performance by increasing the number of antennas of the LTE-MIMO channel.
Volume: 16
Issue: 6
Page: 2563-2569
Publish at: 2018-12-01

Inclined Image Recognition for Aerial Mapping using Deep Learning and Tree based Models

10.12928/telkomnika.v16i6.10157
Muhammad; Institut Teknologi Sepuluh Nopember Attamimi , Ronny; Institut Teknologi Sepuluh Nopember Mardiyanto , Astria Nur; Institut Teknologi Sepuluh Nopember Irfansyah
One of the important capabilities of an unmanned aerial vehicle (UAV) is aerial mapping. Aerial mapping is an image registration problem, i.e., the problem of transforming different sets of images into one coordinate system. In image registration, the quality of the output is strongly influenced by the quality of input (i.e., images captured by the UAV). Therefore, selecting the quality of input images becomes important and one of the challenging task in aerial mapping because the ground truth in the mapping process is not given before the UAV flies. Typically, UAV takes images in sequence irrespective of its flight orientation and roll angle. These may result in the acquisition of bad quality images, possibly compromising the quality of mapping results, and increasing the computational cost of a registration process. To address these issues, we need a recognition system that is able to recognize images that are not suitable for the registration process. In this paper, we define these unsuitable images as “inclined images,” i.e., images captured by UAV that are not perpendicular to the ground. Although we can calculate the inclination angle using a gyroscope attached to the UAV, our interest here is to recognize these inclined images without the use of additional sensors in order to mimic how humans perform this task visually. To realize that, we utilize a deep learning method with the combination of tree-based models to build an inclined image recognition system. We have validated the proposed system with the images captured by the UAV. We collected 192 images and labelled them with two different levels of classes (i.e., coarse- and fine-classification). We compared this with several models and the results showed that our proposed system yielded an improvement of accuracy rate up to 3%.
Volume: 16
Issue: 6
Page: 3034-3044
Publish at: 2018-12-01

Comparison of Multiscale Entropy for Lung Sound Classification

10.11591/ijeecs.v12.i3.pp984-994
Achmad Rizal , Risanuri Hidayat , Hanung Adi Nugroho
Lung sound is a biological signal that can be used to determine the health level of the respiratory tract. Various digital signal processing techniques have been developed for automatic classification of lung sounds. Entropy is one of the parameters used to measure the biomedical signal complexity. Multiscale entropy is introduced to measure the entropy of a signal at a particular scale range. Over time, various multiscale entropy techniques have been proposed to measure the complexity of biological signals and other physical signals. In this paper, some multiscale entropy techniques for lung sound classification are compared. The result of the comparison indicates that the Multiscale Permutation Entropy (MPE) produces the highest accuracy of 97.98% for five lung sound datasets. The result was achieved for the scale 1-10 producing ten features for each lung sound data. This result is better than other seven entropies. Multiscale entropy analysis can improve the accuracy of lung sound classification without requiring any features other than entropy.
Volume: 12
Issue: 3
Page: 984-994
Publish at: 2018-12-01

Using Partial Credit Model to Improve the Quality of an Instrument

10.11591/ijere.v7i4.15146
Saras Krishnan , Noraini Idris
In using the Rasch model to improve the quality of an instrument, analysis purports to determine if the sample collaborates well with the items in the instrument such that the results are measuring a single underlying variable. The relevant properties of Rasch analysis are reliability and validity which are key indicators of the quality of a measurement instrument. This paper discusses the use of one type of Rasch model that is the Partial Credit Model to investigate reliability and validity of an instrument. By removing or changing items in the instrument when conditions of reliability and validity are not met, the quality of the instrument is improved.
Volume: 7
Issue: 4
Page: 313-316
Publish at: 2018-12-01

Fuzzy Rule-based Classification Systems for the Gender Prediction from Handwriting

10.12928/telkomnika.v16i6.9478
Lala Septem; Universitas Pendidikan Indonesia Riza , Aldi; Universitas Pendidikan Indonesia Zainafif , Rasim; Universitas Pendidikan Indonesia Rasim , Shah; University of Swabi Nazir
The handwriting is an object that can describe information about the author implicitly. For example, it is able to predict the gender. Recently, the gender prediction based on handwriting becomes an interesting research. Even in 2013, an competition for prediction gender from handwriting has been held by Kaggle. However, the accuracies of current approaches are relatively low. So, in this study, we attempt to implement Fuzzy Rule-Based Classification Systems (FRBCSs) for gender predictions from handwriting. Three stages are conducted to achieve the objective, as follows: defining some features based on Graphology Techniques (e.g., pressure, height, and margin on writing), collecting real datasets, processing on digital images (i.e., image segmentation, projection profiles, and margin calculation, etc.), and implementing FRBCSs. The implemented algorithm based on FRBCSs in this research is Chi’s Algorithm, which is a method based on Fuzzy Logic for classification tasks. Moreover, some experiments and analysis, involving 75 respondents consisting of 36 males and 39 females, have been done to validate the proposed model. From the simulations, the classification rate obtained is 76%. Besides improving the accuracy rate, the proposed model can provide an understandable model by utilizing fuzzy rule-based systems.
Volume: 16
Issue: 6
Page: 2725-2732
Publish at: 2018-12-01
Show 1360 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration