Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

Trend of NFC Technology for Payment Transaction

10.12928/telkomnika.v16i2.8441
Edi Purnomo; Bina Nusantara University Putra , Fifilia; Bina Nusantara University Fifilia , Hanny; Bina Nusantara University Juwitasary
Implementation of NFC Technology was developed to facilitate instant payment transaction such as purchase tickets, goods, or service to become one of the digital wallet besides to using credit cards. The high rate of mobile devices usage in Indonesia make many companies take advantage of this device as a media in electronic payment transactions, a lot of banking and financial product in Indonesia used this technology such as E-money, T-cash, Flazz, Ooredoo, Dompetku, XL-Tunaiku, Doku Wallet, Skye card, Artajasa MYNT and many more. The technique that used in this research to prove the hypotheses was Structural Equation Model (SEM) using Smart PLS software, we will used questionnaire and literature review method to found trend of NFC use. The population from which to draw conclusion was defined as all individual capable use NFC Technology for payment transaction .In this study, we will investigate NFC use in Indonesia, The proposed research model was develop by TAM Framework with some dimension from NFC study iterature that is Mobile Payment Knowledge, Technology, Trust, Behaviour and Compatibility into the model, in order to determine the significant factor that influence of NFC use in Indonesia.
Volume: 16
Issue: 2
Page: 795-802
Publish at: 2018-04-01

Wavelet-Based Weighted Median Filter For Image Denoising Of MRI Brain Images

10.11591/ijeecs.v10.i1.pp201-206
N. Rajalakshmi , K. Narayanan , P. Amudhavalli
Preliminary diagnosing of MRI images from the hospital cannot be relied on because of the chances of occurrence of artifacts resulting in degraded quality of image, while others may be confused with pathology. Obtained MRI image usually contains limited artifacts. It becomes complex one for doctors in analyzing them. By increasing the contrast of an image, it will be easy to analyze. In order to find the tumor part efficiently MRI brain image should be enhanced properly. The image enhancement methods mainly improve the visual appearance of MRI images. The goal of denoising is to remove the noise, which may corrupt an image during its acquisition or transmission, while retaining its quality. In this paper effectiveness of seven denoising algorithms viz. median filter, wiener filter, wavelet filter, wavelet based wiener, NLM, wavelet based NLM, proposed wavelet based weighted median filter(WMF) using MRI images in the presence of additive white Gaussian noise is compared. The experimental results are analyzed in terms of various image quality metrics.
Volume: 10
Issue: 1
Page: 201-206
Publish at: 2018-04-01

New Blind Muti-signature Schemes based on ECDLP

10.11591/ijece.v8i2.pp1074-1083
Duc Nguyen Tan , Hai Nguyen Nam , Minh Nguyen Hieu , Hiep Nguyen Van
In various types of electronic transactions, including election systems and digital cash schemes, user anonymity and authentication are always required. Blind signatures are considered the most important solutions to meeting these requirements. Many studies have focused on blind signature schemes; however, most of the studied schemes are single blind signature schemes. Although blind multi-signature schemes are available, few studies have focused on these schemes. In this article, blind multi-signature schemes are proposed based on the Elliptic Curve Discrete Logarithm Problem (ECDLP). The proposed schemes are based on the GOST R34.10-2012 digital signature standard and the EC-Schnorr digital signature scheme, and they satisfy blind multi-signature security requirements and have better computational performance than previously proposed schemes. The proposed schemes can be applied in election systems and digital cash schemes.
Volume: 8
Issue: 2
Page: 1074-1083
Publish at: 2018-04-01

PD Behaviors of Monoester Insulating Oil under Different Moisture Contents

10.12928/telkomnika.v16i2.7356
Abdul; Andalas University Rajab , Motoo; Kyushu Institute of Technology Tsuchie , Masahiro; Kyushu Institute of Technology Kozako , Masayuki; Kyushu Institute of Technology Hikita , Takashi; Lion Specialty Chemicals CO., LTD. Suzuki
One of the problems encounters in implementing vegetable oils (natural esters) as a transformer insulating oil is their viscosity which is high. To address this problem, monoester derived from vegetable oil was introduced. This paper deals with partial discharge (PD) behaviors of dry and moist samples of a monoester type insulating oil, palm fatty acid ester (PFAE), under AC high voltage utilizing a needle plane electrode configuration. Variations of average PD charge and PD number against the variation of voltage application, as well as their polarity discrimination under both dry and moist sample conditions are analyzed. PD pulses phase distributions of both dry and moist sample oils are elaborated. Finally, a mechanism of the water molecules effect on PD behavior is proposed based on experimental results and shown schematically.
Volume: 16
Issue: 2
Page: 481-487
Publish at: 2018-04-01

Sensor Fusion Algorithm by Complementary Filter for Attitude Estimation of Quadrotor with Low-Cost IMU

10.12928/telkomnika.v16i2.9020
A.; Universiti Teknikal Malaysia Melaka Noordin , M. A. M.; Universiti Teknologi Malaysia Basri , Z.; Universiti Teknologi Malaysia Mohamed
This paper proposes a sensor fusion algorithm by complementary filter technique for attitude estimation of quadrotor UAV using low-cost MEMS IMU. Angular rate from gyroscope tend to drift over a time while accelerometer data is commonly effected with environmental noise. Therefore, high frequency gyroscope signal and low frequency accelerometer signal is fused using complementary filter algorithm. The complementary filter scaling factor K1=0.98 and K2=0.02 are used to merge both gyro and accelerometer. The results show that the smooth roll, pitch and yaw attitude angle can be obtained from the low cost IMU by using proposed sensor fusion algorithm.
Volume: 16
Issue: 2
Page: 868-875
Publish at: 2018-04-01

Analyzing the Sea Weather Effects to the Ship Maneuvering in Vietnam’s Sea from BinhThuan Province to Ca Mau Province Based on Fuzzy Control Method

10.12928/telkomnika.v16i2.7753
Xuan Kien; Ho Chi Minh City University of Transport Dang , Le Anh-Hoang; Ho Chi Minh City University of Transport Ho , Viet-Dung; Ho Chi Minh City University of Transport Do
Vietnam is located in the tropical monsoon climate, so there are many storms affecting the marine environment each year. However, Vietnam’s sea also has distinct characteristics due to the continental shelf factors, salinity, sea currents and viscosity water. In this paper, the sea weather effects to the ship in the sea area from BinhThuan province to Ca Mau province are analyzed. Specifically, wave, wind and current which are the three main factors affecting the safety of ship are thoroughly examined. Importantly, the survey parameters have been built from the actual operating environment. In addition, maintaining the stability of dynamic positioning system in Vietnam weather conditions is the main point of this study.
Volume: 16
Issue: 2
Page: 533-543
Publish at: 2018-04-01

Design Flexural Piezoelectric Acoustic Transducers Array based d33 Mode Polarization

10.11591/ijeecs.v10.i1.pp59-65
K.A. Ahmad , A. Abd Manaf , Z. Hussain Hussain , Z. Janin
Piezoelectric Acoustic Transducer (PAT) is a transducers used in many application such as medical diagnostic, medical ultrasonic imaging and underwater acoustic applications. Latest research, PAT were investigated in marine application and underwater acoustic imaging. Conventional PAT is design based on sensing element, Piezoelectric Material, matching layer and backing layer. But the conventional method still has problem with issues of narrow bandwidth, directivity and low sensitivity. This problem is occurred when the transducer need to increase the image resolution. The size of single element will become smaller to meet the requirement of high resolution. PZT-5H have high piezoelectric constant (d31) and low dielectric loss. It is chosen as sensing element in this design of PAT because it will increase the sensitivity of transducers. The PAT is design based on d33 mode polarization to improve the receiving sensitivity. The fabrication process are included wet etching on Printed Circuit Board (PCB), spin coated Polydimethylsiloxane (PDMS), and baked transducer on hot plate. PAT is characterized using Pulse-Echo method. Pulse-Echo method will determine the sensitivity, directivity and operating bandwidth of acoustic transducers in underwater applications. Open circuit receiving voltage (OCRV) is voltage response to determine the sensitivity of acoustic transducer. The commercial projector and hydrophone will calibrate to obtain the reliability of result. In cross talk test, at some particular frequency, Pin 2 and Pin 3 have low sensitivity value. It is because Pin 2 and Pin 3 received low acoustic wave pressure. The PAT array based d33 mode polarization shows it has more receiving sensitive compared to commercial acoustic transducers. The design transducer has sensitivity at -56 dB re 1V/µPa at resonance frequency, 100kHz and fractional bandwidth at 30%.
Volume: 10
Issue: 1
Page: 59-65
Publish at: 2018-04-01

Anomaly Detection in Log Records

10.11591/ijeecs.v10.i1.pp343-347
Poonam Ghuli
Complex software systems are continuously generating application and server logs for the events which had occurred in the past. These logs generated and can be utilized for anomaly and intrusion detection. These log files can be used for anomaly or outlier detection. Certain types of abnormalities or exceptions such as spikes in HTTP requests, number of exceptions raised in logs, etc. All these events are logged into the log files for further analysis. These types of events are generally used for predicting the anomalies in future. The developed prototype assumes that the user inputs log records in a standard apache log format. At first the user uploads the log file for outlier detection. Next, a prototype is developed to get the number of HTTP requests for outlier detection. Then anomalies in number of HTTP requests are detected using three techniques namely InterQuartileRange method, Moving averages and Median Absolute deviation. Once the outliers are detected, these outliers are removed from the current dataset. This output is given as input to the Multilayer Perceptron model to predict the number of HTTP requests at the next timestamp 
Volume: 10
Issue: 1
Page: 343-347
Publish at: 2018-04-01

Voltage Stability Prediction on Power Networks using Artificial Neural Networks

10.11591/ijeecs.v10.i1.pp1-9
Gitanjali Saha , Kabir Chakraborty , Priyanath Das
 The objective of this paper is to predict the secure or the insecure state of the power system network using a hybrid technique which is a combination of Artificial Neural Network (ANN) and voltage stability indexes. Voltage collapse or an uncontrollable drop in voltage occurs in a system when there is a change in the condition of the system or a system is overloaded. A Transference Index (TI) which acts as a voltage stability indicator has been formulated from the equivalent two-bus network of a multi-bus power system network, which has been tested on a standard IEEE 30-bus system and the result is validated with a standard Fast Voltage Stability Index (FVSI). FACTS devices in the critical bus have been considered for the improvement of the voltage stability of the system. An ANN based supervised learning algorithm has been conferred in this paper alongside Contingency Analysis (CA) for the prediction of voltage security in an  IEEE 30 - bus power system network. 
Volume: 10
Issue: 1
Page: 1-9
Publish at: 2018-04-01

Ant Based Cross Layered Optimization Protocol for WMSN with Fuzzy Clustering

10.11591/ijeecs.v10.i1.pp295-301
DipaliParag Adhyapak , Sridharan Bhavani , Aparna Pradeep Laturkar
Wireless Multimedia Sensor Network (WMSN) is embedded with large number of Audio, Video and scalar sensor nodes which can able to retrieve the multimedia information from the environment. WMSN has several challenges such as life time of the network, Memory requirement, Coverage, Bandwidth and QoS metrics. Hence selection of routing algorithm is crucial in WMSN. Again interdependencies of the protocol layer cannot be neglected to improve the network performance. Clustering in WMSN is challenging task in order to increase network lifetime and to improve the communication. Hence Fuzzy clustered Ant based cross layer protocol (FCAXL) is proposed. In this paper performance analysis of ant based cross layer optimization protocol with fuzzy clustering based on number of nodes and packet size is done. Simulation results shows that Fuzzy clustered ant based cross layer optimization protocol performs best as compared to AntSenseNet routing protocol, Cross layer routing protocol and Ant based cross layer routing protocol in terms of QoS parameters such as Throughput, Packet delivery ratio and delay. Hence the life time of the network increases.
Volume: 10
Issue: 1
Page: 295-301
Publish at: 2018-04-01

Cluttered Traffic Distribution in LoRa LPWAN

10.11591/ijeecs.v10.i1.pp214-223
Nur Aishah Bt. Zainal , Mohamed Hadi Habaebi , Israth Chowdhury , Md Rafiqul Islam
Low Power WAN (LPWAN) is a wireless broad area network technology. It is interconnects using only low bandwidth, less power consumption at long range. This technology is operating in unauthorized spectrum which designed for wireless data communication. To have an insight of such long-range technology, this paper evaluates the performance of LoRa radio links under shadowing effect and realistic smart city utilities clutter grid distribution. Such environment is synonymous to residential, industrial and modern urban centers. The focus is to include the effect of shadowing on the radio links while attempting to study the optimum sink node numbers and their locations for maximum sensor node connectivity. Results indicate that the usual unrealistic random node distribution does not reflect actual real-life scenario where many of these sensing nodes follow the built infrastructure around the city of smart buildings. The system is evaluated in terms of connectivity and packet loss ratio.
Volume: 10
Issue: 1
Page: 214-223
Publish at: 2018-04-01

Grid & Force Based Sensor Deployment Methods in WSN using PSO

10.11591/ijeecs.v10.i1.pp271-279
Aparna Pradeep Laturkar , Sridharan Bhavani , DeepaliParag Adhyapak
Wireless Sensor Network (WSN) is emergingtechnology and has wide range of applications, such as environment monitoring, industrial automation and numerous military applications. Hence, WSN is popular among researchers. WSN has several constraints such as restricted sensing range, communication range and limited battery capacity. These limitations bring issues such as coverage, connectivity, network lifetime and scheduling & data aggregation. There are mainly three strategies for solving coverage problems namely; force, grid and computational geometry based. PSO is a multidimensional optimization method inspired from the social behavior of birds called flocking. Basic version of PSO has the drawback of sometimes getting trapped in local optima as particles learn from each other and past solutions. This issue is solved by discrete version of PSO known as Modified Discrete Binary PSO (MDBPSO) as it uses probabilistic approach. This paper discusses performance analysis of random; grid based MDBPSO (Modified Discrete Binary Particle Swarm Optimization), Force Based VFCPSO and Combination of Grid & Force Based sensor deployment algorithms based on interval and packet size. From the results of Combination of Grid & Force Based sensor deployment algorithm, it can be concluded that its performance is best for all parameters as compared to rest of the three methods when interval and packet size is varied.
Volume: 10
Issue: 1
Page: 271-279
Publish at: 2018-04-01

Multi-objective IT Project Selection Model for Improving SME Strategy Deployment

10.11591/ijece.v8i2.pp1102-1111
Abir El Yamami , Khalifa Mansouri , Mohammed Qbadou , El Hossein Illousamen
Due to the limited financial resources of small and Medium-sized enterprises (SMEs), the proven approaches for selecting IT project portfolio for large enterprises may fail to perform in SMEs; SME top management want to make sure that the corporate strategy is carried out effectively by IT project portfolio before investing in such projects. In order to provide automated support to the selection of IT projects, it seems inevitable that a multi-objective approach is required in order to balance possible competing and conflicting objectives. Under such an approach, individual projects would be evaluated not just on their own performance but on the basis of their contribution to balance the overall portfolio. In this paper, we extend and explore the concept of IT project selection to improve SME strategy deployment. In particular, we present a model that assesses an individual project in terms of its contribution to the overall strategic objectives of the portfolio. A simulation using the model illustrates how SME can rapidly achieve maximal business goals by deploying the multi-objective algorithm when selecting IT projects.
Volume: 8
Issue: 2
Page: 1102-1111
Publish at: 2018-04-01

Swarm Based Cross Layer Optimization Protocol for WMSN

10.11591/ijeecs.v10.i1.pp302-308
DeepaliParag Adhyapak , Sridharan Bhavani , Aparna Pradeep Laturkar
Wireless Multimedia Sensor Network (WMSN) is comprised of tiny, low cost multimedia devices such as video cameras and microphones. These networks can transfer scalar as well as multimedia data into real time as well as non-real time applications. However addition of such devices exposes additional challenges on both QoS assurance and energy efficiency for efficient use of resources.  This paper presents cross layer based AntSenseNet protocol to meet various QoS requirements such as throughput, jitter, lifetime and packet delivery ratio in order to improve network lifetime. Cross layer routing protocol utilizes scheduling algorithm and AntSenseNet protocol builds hierarchical structure and able to use multipath routing protocol.  Simulation results shows Cross layer based AntSenseNet protocol outperforms Ant Sense routing protocol and cross layer routing protocol in terms of throughput and packet delivery ratio
Volume: 10
Issue: 1
Page: 302-308
Publish at: 2018-04-01

The End User Requirement for Project Management Software Accuracy

10.11591/ijece.v8i2.pp1112-1121
Fachrurrazi Fachrurrazi
This research explains the relationship between the end user requirement and accuracy of PMS (Project Management Software). The research aims are to analyze the PMS accuracy and measuring the probability of PMS accuracy in achieving ±1% of the end user requirement. The bias statistical method will be used to prove the PMS accuracy that based on the hypothesis testing. The result indicates the PMS is still accurate to be implemented in Aceh-Indonesia area projects that using the SNI (National Indonesia Standard as current method) with the accuracy index of ±7.5%. The achievement probability of reaching the end user requirement is still low of ±21.77%. In case of the PMS, the low achievement of the end user requirement is not only caused by the low accuracy of the PMS but also caused by the amount of variability error, which is influenced by the amount of variation of the project activity. In this study, we confirm that it is necessary to reconcile both conditions between the PMS accuracy and the end user requirements.
Volume: 8
Issue: 2
Page: 1112-1121
Publish at: 2018-04-01
Show 1370 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration