Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

Novel Technique for Comprehensive Noise Identification and Cancellation in GSM Signal

10.11591/ijece.v8i2.pp1222-1229
Rekha N , Fathima Jabeen
Presence of noise significantly degrades the contents being transmitted over GSM channel. With the evolution of next generation of communication system, the challenges in noise cancellation in voice along with data transmission are not being addressed effectively by existing filters. Therefore, the proposed system offers a mechanism where emphasis is laid on identification of superior and inferior forms of GSM transient signal followed by cancellation of its noise level. Designed using analytical methodology, the proposed system harness the potential of probability theory to perform a modeling that associates allocated power of the transmitting device with the level of noise. The outcome of the study is found to offer a comprehensive identification of different forms of noise and can precisely determine the level of superior and inferior quality of signal. The outcome significantly assists in designing an accurate filter for noise cancellation in GSM signal.
Volume: 8
Issue: 2
Page: 1222-1229
Publish at: 2018-04-01

Sentence Extraction Based on Sentence Distribution and Part of Speech Tagging for Multi-Document Summarization

10.12928/telkomnika.v16i2.8431
Agus Zainal; Institut Teknologi Sepuluh Nopember Arifin , Moch Zawaruddin; Institut Teknologi Sepuluh Nopember Abdullah , Ahmad Wahyu; Institut Teknologi Sepuluh Nopember Rosyadi , Desepta Isna; Institut Teknologi Sepuluh Nopember Ulumi , Aminul; Institut Teknologi Sepuluh Nopember Wahib , Rizka Wakhidatus; Institut Teknologi Sepuluh Nopember Sholikah
Automatic multi-document summarization needs to find representative sentences not only by sentence distribution to select the most important sentence but also by how informative a term is in a sentence. Sentence distribution is suitable for obtaining important sentences by determining frequent and well-spread words in the corpus but ignores the grammatical information that indicates instructive content. The presence or absence of informative content in a sentence can be indicated by grammatical information which is carried by part of speech (POS) labels. In this paper, we propose a new sentence weighting method by incorporating sentence distribution and POS tagging for multi-document summarization. Similarity-based Histogram Clustering (SHC) is used to cluster sentences in the data set. Cluster ordering is based on cluster importance to determine the important clusters. Sentence extraction based on sentence distribution and POS tagging is introduced to extract the representative sentences from the ordered clusters. The results of the experiment on the Document Understanding Conferences (DUC) 2004 are compared with those of the Sentence Distribution Method. Our proposed method achieved better results with an increasing rate of 5.41% on ROUGE-1 and 0.62% on ROUGE-2.
Volume: 16
Issue: 2
Page: 843-851
Publish at: 2018-04-01

Accumulator Charging Control with Piezoelectric Based on Fuzzy Algorithm Scheduling

10.12928/telkomnika.v16i2.7067
Iswanto; Universitas Muhammadiyah Yogyakarta Iswanto , Wahyu Sari; Universitas Muhammadiyah Yogyakarta Agustiningsih , Faaris; Universitas Muhammadiyah Yogyakarta Mujaahid , Rohmansyah; Universitas Muhammadiyah Yogyakarta Rohmansyah , Aris; Universitas Muhammadiyah Surakarta Budiman
Battery accumulator charging with pizoelectric takes considerable long time so that an energy harvester is needed by using in this study LTC 3588 circuit. However, by using the energy harvester, the pizoelectric cannot be used to charge 12 volt battery, thus a boost converter is needed. The output voltage is too small to increase by using the boost converter so that the output from the energy converter is used to charge four AA batteries. After the voltage of the four AA batteries as much as 4.7 volt is increased by using the boost converter, the batteries can be used to charge accumulator battery 12 volt. To charge the battery to accumulator, scheduling algorithm planted in microcontroller arduino is needed. By using the scheduling algorithm with fuzzy logic in the arduino microcontroller, the microcontroller is able to control schedule of accumulatro battery charging.
Volume: 16
Issue: 2
Page: 635-640
Publish at: 2018-04-01

Varying Effects of Temperature and Path-length on Ozone Absorption Cross-Section

10.12928/telkomnika.v16i2.8577
Enenche; Federal University Of Technology Minna Patrick , Michael; Federal University of Technology Minna David , A.O.; Federal University of Technology Minna Caroline , Mohd Haniff; Universiti Teknologi Malaysia Ibrahim , Sevia Mahdaliza; Universiti Teknologi Malaysia Idrus , Tay Ching En; First City University College Marcus
Inconsistencies in the absorption cross section of ozone have been observed. Hence, for accurate measurement, we have reported the combined effects of varying optical path-length and temperature on the ozone gas absorption cross section (OACS) at 334.15nm. Adopting optical absorption spectroscopy, results of the (OACS) have been simulated using spectralcalc simulator with HITRAN 12 has the latest line list. OACS increased by 52.27% as the temperature increased from 100K to 350K while it was slightly affected by a 0.007% decrease varying the path-length from 0.75cm-130cm.
Volume: 16
Issue: 2
Page: 618-623
Publish at: 2018-04-01

Internal and External e-Customs Services IOS Application Case Study: Kuwait Customs Department

10.11591/ijeecs.v10.i1.pp400-408
Soha Aljaber , Nayfah Mohsen Almutairi , Abdulrahman Alkandari
Government regulations usually characterized by the many stages of completion of any transaction and that causing a delay in the work and that wasting a lot of time. Especially with the particular customs system which consists of several points of entry, including land, sea, and air. In addition, the General Customs Department is one of the sensitive circuits in the state. Therefore, to continue the process any shipment or any transaction relating to customs, it requires a long time. This paper presented a design for an application that running on smartphones with IOS system. This application provides internal services and external services for the General Customs Department to ease the completion of any transaction either for the customs’ employee or the citizens. The employee uses the internal services section, and the external services section is used by the citizens. As a result of this application, it provides time and effort for the citizens and customs and decreasing the number of customs’ reviewers.
Volume: 10
Issue: 1
Page: 400-408
Publish at: 2018-04-01

Personal Security Tracking based on Android and Web Application

10.12928/telkomnika.v16i2.7625
Angry; Bina Nusantara University Ronald , Violitta; Bina Nusantara University Yesmaya , Muhammad; Bina Nusantara University Danaparamita
Nowadays, the frequency of abduction is increasing significantly. Information technology provide many social media which is causing the leaked of personal information where abductor can find out the information. Using social media, people can share location, life event, and anything related about their life event, these become the useful information for the abductor. To anticipate this, a lot of personal tracking device is developed, but the response is too late. Because, the family or relative of the victims will notice that abduction had happen after the victim is lost. According to the problem, this research will focus on develop the personal tracking device which trigger by the victims who own the phone based on android and web application. Whenever the abduction happens, the victim just need to click the button and the system will send a message to the relatives and family in their contact also trigger the notification to the local security. Software development life cycle that will be used is scrum which is divided into several processes like backlog, sprints, scrum meetings, and demos. The result of this research is android application for user and web application for managing application.
Volume: 16
Issue: 2
Page: 771-775
Publish at: 2018-04-01

Framework for Contextual Outlier Identification using Multivariate Analysis approach and Unsupervised Learning

10.11591/ijece.v8i2.pp1092-1101
Madhu Chandra G. , Sreerama Reddy G. M.
Majority of the existing commercial application for video surveillance system only captures the event frames where the accuracy level of captures is too poor. We reviewed the existing system to find that at present there is no such research technique that offers contextual-based scene identification of outliers. Therefore, we presented a framework that uses unsupervised learning approach to perform precise identification of outliers for a given video frames concerning the contextual information of the scene. The proposed system uses matrix decomposition method using multivariate analysis to maintain an equilibrium better faster response time and higher accuracy of the abnormal event/object detection as an outlier. Using an analytical methodology, the proposed system blocking operation followed by sparsity to perform detection. The study outcome shows that proposed system offers an increasing level of accuracy in contrast to the existing system with faster response time.
Volume: 8
Issue: 2
Page: 1092-1101
Publish at: 2018-04-01

Noise Level Estimation for Digital Images Using Local Statistics and Its Applications to Noise Removal

10.12928/telkomnika.v16i2.9060
Asem; University of Zawia Khmag , Sami; University of Zawia Ghoul , Syed Abdul; Universiti Putra Malaysia Rahman Al-Haddad , Noraziahtulhidayu; Universiti Putra Malaysia Kamarudin
In this paper, an automatic estimation of additive white Gaussian noise technique is proposed. This technique is built according to the local statistics of Gaussian noise. In the field of digital signal processing, estimation of the noise is considered as pivotal process that many signal processing tasks relies on. The main aim of this paper is to design a patch-based estimation technique in order to estimate the noise level in natural images and use it in blind image removal technique. The estimation processes is utilized selected patches which is most contaminated sub-pixels in the tested images sing principal component analysis (PCA). The performance of the suggested noise level estimation technique is shown its superior to state of the art noise estimation and noise removal algorithms, the proposed algorithm produces the best performance in most cases compared with the investigated techniques in terms of PSNR, IQI and the visual perception.
Volume: 16
Issue: 2
Page: 915-924
Publish at: 2018-04-01

File Reconstruction in Digital Forensic

10.12928/telkomnika.v16i2.8230
Opim Salim; Universitas Sumatera Utara Sitompul , Andrew; Universitas Sumatera Utara Handoko , Romi Fadillah; Universitas Sumatera Utara Rahmat
File recovery is one of the stages in computer forensic investigative process to identify an acquired file to be used as digital evident. The recovery is performed on files that have been deleted from a file system. However, in order to recover a deleted file, some considerations should be taken. A deleted file is potentially modified from its original condition because another file might either partly or entirely overriding the file content. A typical approach in recovering deleted file is to apply Boyer-Moore algorithm that has rather high time complexity in terms of string searching. Therefore, a better string matching approach for recovering deleted file is required. We propose Aho-Corasick parsing technique to read file attributes from the master file table (MFT) in order to examine the file condition. If the file was deleted, then the parser search the file content in order to reconstruct the file. Experiments were conducted using several file modifications, such as 0% (unmodified), 18.98%, 32.21% and 9.77%. From the experimental results we found that the file reconstruction process on the file system was performed successfully. The average successful rate for the file recovery from four experiments on each modification was 87.50% and for the string matching process average time on searching file names was 0.32 second.
Volume: 16
Issue: 2
Page: 776-794
Publish at: 2018-04-01

Investigations of Component Carrier Selection Algorithms in Long Term Evolution-Advanced

10.11591/ijeecs.v10.i1.pp330-336
Huda Adibah Mohd Ramli , Ani Liza Asnawi , Farah Nadia Mohd Isa , Amelia Wong Azman , Mohamad ‘Ismat Hafizi Mansor
Given that the demand for real-time multimedia contents that require significantly high data rate are getting of high popularity, a new mobile cellular technology known as Long term Evolution-Advanced (LTE-A) was standardized. The LTE-A is envisaged to support high peak data rate by aggregating more than one Component Carriers (CCs) of the same or different frequency bandwidths. Since the inter-band non-contiguous carrier aggregation is likely to be used due to the current frequency allocation, this paper provides a performance study of a number of CC selection algorithms for use in the inter-band non-contiguous downlink LTE-A. It should be noted that CC selection is of paramount importance in the LTE-A operating in backward compatible mode as the LTE-A contains a mixture of the legacy Long Term Evolution (LTE) users that support packets (re)transmission on a single CC and the LTE-A users that utilize more than one CCs for packets (re)transmission. Simulation results demonstrated the efficacy of the Channel-Throughput Aware (CTA) algorithm for maximizing the system capacity without compromising the required Quality of Service of real-time video users.
Volume: 10
Issue: 1
Page: 330-336
Publish at: 2018-04-01

Detection of Malicious Circuitry using Transition Probability Based Node Reduction Technique

10.12928/telkomnika.v16i2.6812
Nirmala Devi; Amrita University M. , Irene Susan; Amrita University Jacob , Sree; Amrita University Ranjani R , Jayakumar; Amrita University M.
In recent years, serious concerns have been raised against the tampering of integrated circuits due to outsourcing of circuits for fabrication. It has led to the addition of malicious circuitry known as Hardware Trojan. In this paper, a transition probability based node reduction technique for faster and efficient Hardware Trojan (HT) detection has been attempted. In the proposed method, the fact that the least controllable and observable nodes or the nodes with least transition probability are more vulnerable as Trojan sites is taken into consideration. The nodes that have lesser activity than the threshold are the candidate nodes. At each candidate node, segmentation is done for further leakage power analysis to detect the presence of Trojans. Experimental results observed on ISCAS’85 and ISCAS’89 benchmark circuits illustrate that the proposed work can achieve remarkable node reduction upto 78.81% and time reduction upto 58.7%. It was also observed that the circuit activity can be increased by varying the input probability. Hence, for further reduction in the Trojan activation time, the weighted input probability was obtained.
Volume: 16
Issue: 2
Page: 573-579
Publish at: 2018-04-01

A Specific Routing Protocol for Flying Adhoc Network

10.12928/telkomnika.v16i2.8444
Bashir Olaniyi; Ahmadu Bello University Zaria Sadiq , Adewale Emmanuel; Ahmadu Bello University Zaria Adedokun , Mohammad Bashir; Ahmadu Bello University Zaria Mu’azu , Yusuf Abubakar; University of Manchester Sha’aban
This paper presents a novel data and timed control routing protocol which is Flying Adhoc Network (FANET) specific. The developed FANET specific routing protocol laid emphasis on the route connectivity in the network by considering the captured data size, minimum allowable distance between randomly moving nodes and connection time. The performance of the proposed FANET specific routing protocol was simulated using NS3. The obtained throughput value for the routing protocol fluctuated between 742.064kbps and 755.083kbps as data are exchanged between nodes. This showed that when all the UAVs are on the network and communicating with one another, the throughput is flatline and not plummet. This implies consistency as nodes join and leave the network. The packet delivery ratio obtained for the FSRP during simulation was 96.13%. These results implied that data is successfully transmitted between the UAV acting as server and UAV acting as client on the network.
Volume: 16
Issue: 2
Page: 606-617
Publish at: 2018-04-01

Characterization of Respiratory Conditions Using Labview and Digital Spirometer

10.11591/ijeecs.v10.i1.pp66-73
S. Noorjannah Ibrahim , A. Z. Jusoh , N. Abdul Malik , A. L. Asnawi , S. Mazalan
One of the effective ways to diagnose various respiratory diseases is using spirometry test. Good spirometer comes with excellent graphical user interface. Spirometer is used to measure lung parameters such as Forced Expiratory Volume in the first second and the sixth seconds (FEV1 and FEV6). This paper presents an algorithm with Graphical User Interface (GUI) for characterization of respiratory conditions using LabVIEW Software. The whole spirometry system consists of a breathing circuitry with pressure sensor and a data acquisition board (NI sbRIO FPGA board). Results obtained from three different volunteers with different health performances are also presented in this paper. The FEV1/FEV6 ratio of a healthy volunteer is 81.1%, an asthma volunteer is 72.04%, and suspected bronchitis volunteer is 33.4%. Based on these results, the unhealthy volunteers tend to have smaller value of FEV1 with lower area under the curve when compared to healthy volunteer.
Volume: 10
Issue: 1
Page: 66-73
Publish at: 2018-04-01

Trash Basket Sensor Notification Using Arduino with Android Application

10.11591/ijeecs.v10.i1.pp120-128
Adel ALFoudery , Abdulrahman Abdullah Alkandari , Nayfah Mohsen Almutairi
The protection of society and environment from garbage accumulation and its polluting effects is carried by waste management companies, the services provided by these companies are improving life overall quality. By preserving raw materials, proper collecting and elimination of trash have reduced pollution and environmental impact. On the other hand, areas which are suffered from inappropriate negative service appreciate the garbage collector’s valuable efforts. Appropriate garbage collection and management facilities have made a recycling process improvement which caused a reduction in waste generation. Also controlling the released contaminators and pollutants has decreased the impact on landfills and protected the environment from the pollution negative effects. Using mobile and electronic technology to enable waste management companies to finish its work and make it easier for collecting trash in a simple and an easy way. We introduce Trash Sensor Android Application to help waste management companies detect trash levels to collect it and help citizens from undesired odours.
Volume: 10
Issue: 1
Page: 120-128
Publish at: 2018-04-01

Real Time Face Recognition Based on Face Descriptor and Its Application

10.12928/telkomnika.v16i2.7418
I Gede Pasek Suta; Mataram University Wijaya , Ario Yudo; Mataram University Husodo , I Wayan Agus; Mataram University Arimbawa
This paper presents a real time face recognition based on face descriptor and its application for door locking. The face descriptor is represented by both local and global information. The local information, which is the dominant frequency content of sub-face, is extracted by zoned discrete cosine transforms (DCT). While the global information, which also is the dominant frequency content and shape information of the whole face, is extracted by DCT and by Hu-moment. Therefore, face descriptor has rich information about a face image which tends to provide good performance for real time face recognition. To decrease the dimensional size of face descriptor, the predictive linear discriminant analysis (PDLDA) is employed and the face classification is done by kNN. The experimental results show that the proposed real time face recognition provides good performances which indicated by 98.30%, 21.99%, and 1.8% of accuracy, FPR, and FNR respectively. In addition, it also needs short computational time (1 second).
Volume: 16
Issue: 2
Page: 739-746
Publish at: 2018-04-01
Show 1368 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration