Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

Trash Basket Sensor Notification Using Arduino with Android Application

10.11591/ijeecs.v10.i1.pp120-128
Adel ALFoudery , Abdulrahman Abdullah Alkandari , Nayfah Mohsen Almutairi
The protection of society and environment from garbage accumulation and its polluting effects is carried by waste management companies, the services provided by these companies are improving life overall quality. By preserving raw materials, proper collecting and elimination of trash have reduced pollution and environmental impact. On the other hand, areas which are suffered from inappropriate negative service appreciate the garbage collector’s valuable efforts. Appropriate garbage collection and management facilities have made a recycling process improvement which caused a reduction in waste generation. Also controlling the released contaminators and pollutants has decreased the impact on landfills and protected the environment from the pollution negative effects. Using mobile and electronic technology to enable waste management companies to finish its work and make it easier for collecting trash in a simple and an easy way. We introduce Trash Sensor Android Application to help waste management companies detect trash levels to collect it and help citizens from undesired odours.
Volume: 10
Issue: 1
Page: 120-128
Publish at: 2018-04-01

Real Time Face Recognition Based on Face Descriptor and Its Application

10.12928/telkomnika.v16i2.7418
I Gede Pasek Suta; Mataram University Wijaya , Ario Yudo; Mataram University Husodo , I Wayan Agus; Mataram University Arimbawa
This paper presents a real time face recognition based on face descriptor and its application for door locking. The face descriptor is represented by both local and global information. The local information, which is the dominant frequency content of sub-face, is extracted by zoned discrete cosine transforms (DCT). While the global information, which also is the dominant frequency content and shape information of the whole face, is extracted by DCT and by Hu-moment. Therefore, face descriptor has rich information about a face image which tends to provide good performance for real time face recognition. To decrease the dimensional size of face descriptor, the predictive linear discriminant analysis (PDLDA) is employed and the face classification is done by kNN. The experimental results show that the proposed real time face recognition provides good performances which indicated by 98.30%, 21.99%, and 1.8% of accuracy, FPR, and FNR respectively. In addition, it also needs short computational time (1 second).
Volume: 16
Issue: 2
Page: 739-746
Publish at: 2018-04-01

Tree Physiology Optimization in Constrained Optimization Problem

10.12928/telkomnika.v16i2.9021
A. Hanif; Universiti Teknologi PETRONAS Halim , I.; Universiti Teknologi PETRONAS Ismail
Metaheuristic algorithms are proven to be more effective on finding global optimum in numerous problems including the constrained optimization area. The algorithms have the capacity to prevail over many deficiencies in conventional algorithms. Besides of good quality of performance, some metaheuristic algorithms have limitations that may deteriorate by certain degree of difficulties especially in real-world application. Most of the real-world problems consist of constrained problem that is significantly important in modern engineering design and must be considered in order to perform any optimization task. Therefore, it is essential to compare the performance of the algorithm in diverse level of difficulties in constrained region. This paper introduces Tree Physiology Optimization (TPO) algorithm for solving constrained optimization problem and compares the performance with other existing metaheuristic algorithms. The constrained problems that are included in the comparison are three engineering design and nonlinear mathematic problems. The difficulties of each proposed problem are the function complexity, number of constraints, and dimension of variables. The performance measure of each algorithm is the statistical results of finding the global optimum and the convergence towards global optimum.
Volume: 16
Issue: 2
Page: 876-882
Publish at: 2018-04-01

Secure E-voting System by Utilizing Homomorphic Properties of the Encryption Algorithm

10.12928/telkomnika.v16i2.8420
Rifki; Telkom University Suwandi , Surya Michrandi; Telkom University Nasution , Fairuz; Telkom University Azmi
The use of cryptography in the e-voting system to secure data is a must to ensure the authenticity of the data. In contrast to common encryption algorithms, homomorphic encryption algorithms had unique properties that can perform mathematical operations against ciphertext. This paper proposed the use of the Paillier and Okamoto-Uchiyama algorithms as two homomorphic encryption algorithms that have the additional properties so that it can calculate the results of voting data that has been encrypted without having to be decrypted first. The main purpose is to avoid manipulation and data falsification during vote tallying process by comparing the advantages and disadvantages of each algorithm.
Volume: 16
Issue: 2
Page: 862-867
Publish at: 2018-04-01

Cyber Threat Intelligence – Issue and Challenges

10.11591/ijeecs.v10.i1.pp371-379
Md Sahrom Abu , Siti Rahayu Selamat , Aswami Ariffin , Robiah Yusof
Today threat landscape evolving at the rapid rate with many organization continuously face complex and malicious cyber threats. Cybercriminal equipped by better skill, organized and well-funded than before. Cyber Threat Intelligence (CTI) has become a hot topic and being under consideration for many organization to counter the rise of cyber-attacks. The aim of this paper is to review the existing research related to CTI. Through the literature review process, the most basic question of what CTI is examines by comparing existing definitions to find common ground or disagreements. It is found that both organization and vendors lack a complete understanding of what information is considered to be CTI, hence more research is needed in order to define CTI. This paper also identified current CTI product and services that include threat intelligence data feeds, threat intelligence standards and tools that being used in CTI. There is an effort by specific industry to shared only relevance threat intelligence data feeds such as Financial Services Information Sharing and Analysis Center (FS-ISAC) that collaborate on critical security threats facing by global financial services sector only. While research and development center such as MITRE working in developing a standards format (e.g.; STIX, TAXII, CybOX) for threat intelligence sharing to solve interoperability issue between threat sharing peers. Based on the review for CTI definition, standards and tools, this paper identifies four research challenges in cyber threat intelligence and analyses contemporary work carried out in each. With an organization flooded with voluminous of threat data, the requirement for qualified threat data analyst to fully utilize CTI and turn the data into actionable intelligence become more important than ever. The data quality is not a new issue but with the growing adoption of CTI, further research in this area is needed.
Volume: 10
Issue: 1
Page: 371-379
Publish at: 2018-04-01

Novel Technique for Comprehensive Noise Identification and Cancellation in GSM Signal

10.11591/ijece.v8i2.pp1222-1229
Rekha N , Fathima Jabeen
Presence of noise significantly degrades the contents being transmitted over GSM channel. With the evolution of next generation of communication system, the challenges in noise cancellation in voice along with data transmission are not being addressed effectively by existing filters. Therefore, the proposed system offers a mechanism where emphasis is laid on identification of superior and inferior forms of GSM transient signal followed by cancellation of its noise level. Designed using analytical methodology, the proposed system harness the potential of probability theory to perform a modeling that associates allocated power of the transmitting device with the level of noise. The outcome of the study is found to offer a comprehensive identification of different forms of noise and can precisely determine the level of superior and inferior quality of signal. The outcome significantly assists in designing an accurate filter for noise cancellation in GSM signal.
Volume: 8
Issue: 2
Page: 1222-1229
Publish at: 2018-04-01

A Technical Review of BMS Performance Standard for Electric Vehicle Applications in Indonesia

10.12928/telkomnika.v16i2.7930
Wahyudi; Sebelas Maret University Sutopo , Budhy; Sebelas Maret University Rahmawatie , Fakhrina; Sebelas Maret University Fahma , Muhammad; Sebelas Maret University Nizam , Agus; Sebelas Maret University Purwanto , B.B; BSN, Jakarta Louhenapessy , Evizal; Universitas Islam Riau Abdul Kadir
The development of Battery Management System (BMS) standards in Indonesia has been carried out causing the FACTS approach. That's approach makes it possible to accommodate all stakeholder requirements. However, the approach has not yet considered a technical review of the regulated standards. Based on this, this study undertook a comprehensive review of BMS performance parameters set out in the standard. In order that the regulated standards not only accommodate the needs of stakeholders but also consider BMS technical studies in order not to impede the future development of BMS.
Volume: 16
Issue: 2
Page: 544-549
Publish at: 2018-04-01

Identification of Canaries Bird’s Chirp Quality Using Statistic Analysis, Sound Analysis and Fuzzy Mamdani Method

10.12928/telkomnika.v16i2.8537
Suhartono; UIN Maulana Malik Ibrahim Malang Suhartono
Research about sound processing by computer using fuzzy logic has been known since 1970. One of approach logic fuzzy method is fuzzy mamdani method. Fuzzy mamdani method is the method to give conclusion from groupof rules of fuzzy. There have to be minimum of two rules, input rule and output rule. Sound processing in canaries bierd’s chirp quality can be explained as measurement standar for canary’s bird’s chirp to the point of song variant and volume. The background of this research is to create a sound identification system that uses dynamic data, the pattern of canary’s bird’s chirp obtained from dynamic data.Dynamic data is difficult to approach with certain formulas. The purpose of this research is to create indentification system to measure Canaries bird’s chirp quality pre-contest. The method used in this research was statistic analysis, sound analysis and fuzzy Mamdani method. Statistic analysis was used to look for important features from Canarie’s chirp sample. This analysis results Max amplitude variable, Min amplitude variable, Root-mean square. Then sound analysis results Autocorrelation time, Zero cross and Energy. Then those values were used as the input in fuzzy Mamdani method process. As for the output variables were the judges score result about the quality of bird’ chirp. The results from identification system of bird’s chirp quality from 6 samples are (1). Accuration level 81,67%. (2) Error sytemrate 18,33%. (3). Based on system performance and error rate that have been known can be concluded that the system can indentifyCanarie’s chirp quality well.
Volume: 16
Issue: 2
Page: 690-702
Publish at: 2018-04-01

Evaluation of Flashover Voltage Levels of Contaminated Hydrophobic Polymer Insulators Using Regression Trees, Neural Networks, and Adaptive Neuro-Fuzzy

10.12928/telkomnika.v16i2.5103
Farag K.; Assiut University, Assiut Abo-Elyousr , L. S.; Aswan University Nassrat
Polluted insulators at high voltages has acquired considerable importance with the rise of voltage transmission lines. The contamination may lead to flashover voltage. As a result, flashover voltage could lead to service outage and affects negatively the reliability of the power system. This paper presents a dynamic model of ac 50Hz flashover voltages of polluted hydrophobic polymer insulators. The models are constructed using the regression tree method, artificial neural network (ANN), and adaptive neuro-fuzzy (ANFIS). For this purpose, more than 2000 different experimental testing conditions were used to generate a training set. The study of the ac flashover voltages depends on silicone rubber (SiR) percentage content in ethylene propylene diene monomer (EPDM) rubber. Besides, water conductivity (μS/cm), number of droplets on the surface, and volume of water droplet (ml) are considered. The regression tree model is obtained and the performance of the proposed system with other intelligence methods is compa ed. It can be concluded that the performance of the least squares regression tree model outperforms the other intelligence methods, which gives the proposed model better generalization ability.
Volume: 16
Issue: 2
Page: 495-512
Publish at: 2018-04-01

Property Exhibition Decision Support System Based on Web Application

10.12928/telkomnika.v16i2.7601
Violitta; Bina Nusantara University Yesmaya , Angry; Bina Nusantara University Ronald , Monica; Bina Nusantara University Hidajat
Complexity in finding property on property exhibition which consider many related constraints is quite high. Customers need to spend much time to analyse the right property to buy depends on their constraints whether salary, distance to work, facility, etc. According to the problem, this research will collect the information from customer on property exhibition to find out the constraint. Also, this research will focus on design and analyses the decision support system for property exhibition. Software development life cycle that will be used is scrum which is divided into several processes like backlog, sprints, scrum meetings, and demos. The result of this research is a web application that help customer to collect the information of the property according to their constraints.
Volume: 16
Issue: 2
Page: 766-770
Publish at: 2018-04-01

Reduced-reference Video Quality Metric Using Spatio-temporal Activity Information

10.12928/telkomnika.v16i2.9044
Farah Diyana Abdul; Department of Electrical and Computer Engineering, International Islamic University Malaysia Rahman , Ahmad Imran; Department of Electrical and Computer Engineering, International Islamic University Malaysia Ibrahim , Dimitris; Department of Electrical and Electronic Engineering, University of Bristol Agrafiotis
Monitoring and maintaining acceptable Quality of Experience is of great importance to video service providers.  Perceived visual quality of transmitted video via wireless networks can be degraded by transmission errors. This paper presents a reduced-reference video quality metric of very low complexity and overhead that makes use of frame based spatial (SI) and temporal (TI) activity levels to monitor the effect of channel errors on video transmitted over error prone networks. The performance of the metric is evaluated relative to that of a number of full and reduced reference metrics. The proposed metric outperforms some of the most popular full reference metrics whilst requiring very little overhead.
Volume: 16
Issue: 2
Page: 909-914
Publish at: 2018-04-01

New Methodology for Asynchronous Motor the Adaptive-Sliding-Mode-Control Capable of High Performance Regulation

10.12928/telkomnika.v16i2.7057
Mahfoudh Mohamed; Mohammadia Engineering School Abderrahmane Hbib , Ouissam; Mohammadia Engineering School Belghazi , Moulay Rachid; Mohammadia Engineering School Douiri , Mohamed; Mohammadia Engineering School Cherkaoui
A new methodology for the design of adaptive sliding mode control (ASMC) for Asynchronous motor control will be presented in this paper. The sliding mode control (SMC) has become one of the most active branches of control theory that has found successful applications in a variety of engineering systems, such an the electrical motors. The new Adaptive sliding mode control method is compared to other existing techniques. The pros and cons of ASMC controller will be demonstrated by intensive simulation results. It will be shown that the presented controller is with fast tracking capability, less steady state error, and robust to load disturbance.
Volume: 16
Issue: 2
Page: 558-566
Publish at: 2018-04-01

Towards Improving Road Safety using Advanced Vehicular Networks

10.12928/telkomnika.v16i2.8210
Wajeb; Jazan University Gharibi , Nasrullah; Indonesian Institute of Sciences Armi
Vehicular Ad-hoc Networks (VANETs) are advanced network technologies applied to improve safety on roads and to offer suitable solutions for Intelligent Transportation Systems (ITS). The goal of VANETs is to assistdrivers and to act as a smart co-pilot that can alret about accidents and help avoiding them while prodivding high-end infotainment systems for both the driver and passengers. Consequently, VANETs can save millions of lives around the world, especially in Saudi Arabia, which has a very high rate of road accidents annualy. In this paper, we introduce and discuss VANETs, related routing protocols, challenging problems, and the existing solutions. This work is a part of a bigger project that aims to enhance VANETs technologies and to updapteITS to significantly promote road safety in general and Saudi Arabia’s roads in particular.
Volume: 16
Issue: 2
Page: 624-628
Publish at: 2018-04-01

Availability Prediction Methods for Terrestrial Free-Space-Optical Link Under Tropical Climate

10.11591/ijeecs.v10.i1.pp224-229
Ahmed Basahel , Md Rafiqul Islam , Mohamed Habaebi , Suriza Ahmad
Free-space optical (FSO) links provide high speed point-to-point wireless communication, but its availability can easily be affected by weather conditions. In heavy rainfall regions, FSO links are relatively sensitive to rain. Availability prediction of FSO is indispensable part, especially in tropical areas. In this paper, methods to predict FSO link availability are presented. The overall performance of FSO link is described in terms of the availability that can be achieved over anticipated link distance. The availability prediction methods demonstrated for an FSO link ranges up to 5 km. The availability prediction methods are based on long-term statistics of atmospheric attenuations and FSO link budget under tropical climate condition. In tropical regions, for a terrestrial FSO link, carrier class availability can be achieved over a few hundred meters only; whereas enterprise class availability can be achieved over a few kilometers link distances. 
Volume: 10
Issue: 1
Page: 224-229
Publish at: 2018-04-01

A Review of Methods Employed to Identify Flicker Producing Sources

10.12928/telkomnika.v16i2.6678
Jeevan; VIT University, Chennai Inamdar , K. Iyswarya; VIT University, Chennai Annapoorani
Because of increasing requirements of the present consumers and industrial units utilizing sensitive loads, there is need of good power quality in order to retain the power quality standards. Nowadays the study of the voltage flicker is becoming essential part of power quality studies. The flicker is typically the effect of a rapidly changing load which is large with respect to the short circuit ability of an electrical supply system. The inferior effects of voltage flicker include malfunctioning of power electronic equipment. Also it causes annoying effects to human. Hence detection of the flicker source is an essential step in the power quality assessment process. This paper delivers a review about methods used to identify flicker producing loads in accordance with IEC 61000-4-15. Once the report related to the disturbance place is known, an investigation and corrective action can be accordingly carried out. Also a method based upon Discrete Wavelet Transform and Artificial Neural Network is proposed to detect initial instance of occurrence of flicker.
Volume: 16
Issue: 2
Page: 465-480
Publish at: 2018-04-01
Show 1369 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration