Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,860 Article Results

Research Designs and Methods in Self-assessment Studies: A Content Analysis

10.11591/ijere.v6i4.8921
Serafina Pastore
This paper focuses on self-assessment practices in the higher education field. In the assessment for learning perspective, self-assessment is related to reflection, metacognition, and self-regulation: all these aspects are considered as fundamental prerequisites for students’ future professional development. Despite the recognition of self-assessment educational benefits and implications, research so far lags behind the rise in the rates of align literature review, research design, and methodology. The study attempts to address this gap in the literature. Based on a critical review of institutional changes in the European higher education context, the paper reflected on main issues and problems faced by educational research on self-assessment. It then tried to identify future research pathways on this topic.
Volume: 6
Issue: 4
Page: 257-264
Publish at: 2017-12-01

Influences of Buffer Size and Eb/No on Very Small Aperture Terminal (VSAT) Communictions

10.12928/telkomnika.v15i4.5788
Debby Maureen; Bogor Agricultural University, Indonesia Talumewo , Heru; Bogor Agricultural University, Indonesia Sukoco , Fahren; Bogor Agricultural University, Indonesia Bukhari
In data communication of the signal transmitted from the transmitter (Tx) to receiver (Rx) stations is very influential. Buffer and Eb/No are two parameters that influence the quality of signal. This research measures those parameters and the relationship among them. This research employs data collected on the Link STM-1 side in Makassar and Timika operated by PT. Telkom Metra Bogor. The period of data is carried out for 56 days taken by using Simple Management Network Protocol (SNMP). To analyze the relationship among those two parameters, we use product moment correlation (PMC) method. The result correlation of the data buffer and Eb/No with a level of real is 0.05 and then buffer set in modem CDM 700 is 50% with threshold Eb/No 12.1 dB and the modulations used 64-QAM. That resulted correlation of side in Makassar is 0.648 and the p-value is 0.000. Correlation of side in Timika is 0.722 and the p-value is 0.000. These results suggest that the two parameters are correlated strong and significant. 
Volume: 15
Issue: 4
Page: 1990-1996
Publish at: 2017-12-01

Coordination of SPS and CES to Mitigate Oscillatory Condition on Power Systems

10.12928/telkomnika.v15i4.6636
Rahmat Septian; Universitas Pertamina, Indonesia Wijanarko , Herlambang; The University of Queensland, Australia Setiadi , Teguh Aryo; Universitas Pertamina, Indonesia Nugroho
Oscillatory condition on power system (low-frequency oscillation) is one of the important factors to determine the quality of the power system. With the increasing number of load demand, this condition is getting worse in recent years. Hence, utilizing addition devices to maintain and mitigate the oscillatory condition of power system is crucial. This paper proposed a method to mitigate power system oscillation by installing one of the flexible AC transmission system (FACTS) devices called solid phase shifter (SPS) and energy storage devices called capacitor energy storage (CES). To analyze the performance of power system with SPS and CES, the eigenvalue and damping ratio analysis are used. Time domain simulation is also investigated to analyze the dynamic behaviors of power system considering SPS and CES. Furthermore, increasing number of load demand is carried out to analyze how much load can be increased without increasing power to the grid. From the simulation, it is found that SPS and CES can mitigate low-frequency oscillation on power system indicated by highest damping, smallest overshoot, and fastest settling time. It is also found that load demand can be increased significantly when SPS and CES installed to the system.
Volume: 15
Issue: 4
Page: 1601-1609
Publish at: 2017-12-01

RTL Modelling for the Cipher Blcok Chaining Mode (Cbc) for Data Security

10.11591/ijeecs.v8.i3.pp709-711
Meenakshi R. K , A. Arivazhagan
The demand of satellite communication, the security algorithms are to be designed in the board. The information from the satellite to the ground is required the data security with the cryptographic algorithms. Advanced encryption standard (AES) is one of the promising cryptographic algorithms for the terrestrial communication. In this paper, the encryption and decryption is mainly focused on the cipher block chaining (CBC) mode for achieving the high secured data transmission. For efficient data transmission, the AES algorithm is implemented by using CBC mode. The proposed work is designed by using RTL modeling and also the minimum numbers of logical elements are used for implementation. 
Volume: 8
Issue: 3
Page: 709-711
Publish at: 2017-12-01

Design of Compact Monopole Antenna using Double U-DMS Resonators for WLAN, LTE, and WiMAX Applications

10.12928/telkomnika.v15i4.7666
Ahmed; German Research Foundation (DFG) Boutejdar , Mohammad Ahmad; University of Palestina Salamin , Saad Dosse; Université Sidi Mohamed ben Abdellah Bennani , Soumia; Mohammed V University El Hani
This paper is under in-depth investigation due to suspicion of possible plagiarism on a high similarity indexIn this research, a novel wide-band microstrip antenna for wideband applications is proposed. The proposed antenna consists of a square radiating patch and a partial ground plane with a smal rectangular notch-shape. Two symmetrical U-slots are etched in radiating patch. The defected microstrip U-shapes and the small notch improve the antenna characterestics such impedance wideband and the gain along the transmission area. The proposed antenna is simulated on an FR4 substrate of a dielectric constant of 4.3, thickness 1.6 mm, permittivity 4.4, and loss tangent 0.018. The simulation and optimization results are carried out using CST software.The antenna topology occupies an area of 30 × 40 × 0.8 mm3 or about 0.629λg × 0.839λg × 0.017λg at 3 GHz (the centerresonance frequency). The antenna covers the range of 2.1711 to 4.0531 GHz, which meet the requirements of the wireless local area network (WLAN), worldwide interoperability for microwave access (WiMAX) and LTE (Long Term Evolution) band applications. Good VSWR, return loss and radiation pattern characteristics are obtained in the frequency band of interest. The obtained Simulation results for this antenna depict that it exhibits good radiation behavior within the transmission frequency range.
Volume: 15
Issue: 4
Page: 1693-1700
Publish at: 2017-12-01

Survey of ICT knowledge based Agriculture Development System

10.11591/ijeecs.v8.i3.pp681-683
H J. Shanthi
E-agriculture gives to applying new things to use ICTs in the country, with the main heart on agricultural. ICT in Agriculture provides a wide range of solutions to some farming ideas. The rising field focuses on the development of agricultural and rural advance through improved information and communication. This time, ICT is used as around all information and communication developments including Android mobiles, IOT devices, communication networking devices,  web services; this variety from original Internet-era technologies and sensors to other pre-accessible aids such as  TV, satellites, and radios. This technique continues to evolve in scope as new ICT applications continue to be harnessed in the agriculture industries. It involves the concept, development, design, application, and evaluation of novel ways to use ICTs in the rural domain, with the main focus on cultivation. This includes principles, norms, methods, and apparatus as well as the growth of personality and institutional capacity, and policy hold is all key mechanism of e-agriculture.
Volume: 8
Issue: 3
Page: 681-683
Publish at: 2017-12-01

Important Parameters for Hand Function Assessment of Stroke Patients

10.12928/telkomnika.v15i4.7228
H.; Universiti Tun Hussein Onn Malaysia Abdul Rahman , C.; Universiti Teknologi Malaysia F. Yeong , K.; Universiti Teknologi Malaysia X. Khor , E.; Universiti Teknologi Malaysia L.M. Su
Clinical scales such as Fugl-Meyer Assessment and Motor Assessment Scale are widely used to evaluate stroke patient's motor performance. However, the scoring systems of these assessments provide only rough estimation, making it difficult to objectively quantify impairment and disability or even rehabilitation progress throughout their rehabilitation period. In contrast, robot-based assessments are objective, repeatable, and could potentially reduce the assessment time. However, robot-based assessment scales are not as well established as conventional assessment scale and the correlation to conventional assessment scale is unclear. This paper discusses the important parameters in order to assess the hand function of stroke patients. This knowledge will provide a contribution to the development of a new robot-based assessment device effectively by including the important parameters in the device. The important parameters were included in development of iRest and yielded promising results that illustrate the potential of the important parameters in assessing the hand function of stroke patients.
Volume: 15
Issue: 4
Page: 1501-1511
Publish at: 2017-12-01

Intelligent Image Capturing Alarm System Using Raspberry Pi

10.12928/telkomnika.v15i4.6532
K.A.M.; Universiti Teknikal Malaysia Melaka, Malaysia Annuar , N.A.; Universiti Teknikal Malaysia Melaka, Malaysia Ab Hadi , S.K.; Universiti Teknikal Malaysia Melaka, Malaysia Subramaniam , M. F. Mohd Ab; Universiti Teknikal Malaysia Melaka, Malaysia Halim , M.B.; Universiti Teknikal Malaysia Melaka, Malaysia N. Shah , A.F.; Universiti Teknikal Malaysia Melaka, Malaysia Kadmin , M.S.; Universiti Teknikal Malaysia Melaka, Malaysia Amri , A.; Universiti Kuala Lumpur-British Malaysian Institute, Malaysia Abdul Salam
Home surveillance system assumes an essential part in this present day living style to help recognizing illegal activities. In this proposed paper, an intelligent image capturing alarm system to protect locker was developed. Raspberry Pi 2 is used as the main controller (server). At the point when any conceivable intrusion is identified, a webcam installed to Raspberry Pi 2 will capture the picture of the intruder. In the meantime, the spotlight or light of the house which represented by an LED will be turned "ON" alongside an alarm sound from a buzzer which is fixed as an output. Taking everything into account, this improvement offers reasonable and easy to use surveillance alarm system.
Volume: 15
Issue: 4
Page: 1651-1658
Publish at: 2017-12-01

A Novel Single Source Multiple Output Converter Integrating Buck-Boost and Fly Back Yopology for SMPS Applications

10.11591/ijeecs.v8.i3.pp733-736
A. Kalirasu
This paper presents a novel single DC input source and multiple DC output suitable for switched mode power supply (SMPS) applications integrating interleaved boost and sepic converter with fly back topology. The proposed converter can be remodeled for any required output voltage power supply without changing hardware structure because wide range of output voltage can be obtained using sepic and boost converters by changing duty cycle command by implementing a simple voltage input pi controller. Conventional fly back topology is added to interleaved circuit to produce desired dc output voltage this voltage can be controlled by choosing turns ratio of fly back transformer. The proposed multi output DC converter is simulated in MATLAB/Simulink environment and results are presented for verifying merits of the converter.
Volume: 8
Issue: 3
Page: 733-736
Publish at: 2017-12-01

Adjustment Delay Scheme to Improve Performance IEEE 802.15.4 Networks

10.12928/telkomnika.v15i4.6092
Eppy; Universitas Negeri Surabaya, Indonesia Yundra , Bih-Hwang; National Taiwan University of Science and Technology, Taiwan Lee
The challenges of CSMA/CA as following: first, when the device nodes detect the channel in busy condition, the device nodes have to increase the value of backoff exponent which cause range of blind backoff process also increase. Second, the blind backoff process will cause lower channel utilization and more energy consumptions. This article proposes a scheme to improve IEEE 802.15.4 medium access control, called adjustment delay scheme (ADES). This article also presents a comprehensive Markov chain analysis to predict the probability of successful transmission, network goodput, bandwidth utilization and total network energy consumption. The validity of the model analysis is proven by precisely matching the simulation experiments. ADES performs better than those of other algorithms in term of the probability of successful packet transmission, network goodput, bandwidth utilization as well as energy consumption in the networks.
Volume: 15
Issue: 4
Page: 1710-1722
Publish at: 2017-12-01

Embedded Applications of MS-PSO-BP on Wind/Storage Power Forecasting

10.12928/telkomnika.v15i4.6720
Jianhong; HoHai University Nantong University, China Zhu , Wen-xia; Nantong University, China Pan , Zhi-ping; Jiangsu Longyuan Wind Power Co., Ltd, China Zhang
Higher proportion wind power penetration has great impact on grid operation and dispatching, intelligent hybrid algorithm is proposed to cope with inaccurate schedule forecast. Firstly, hybrid algorithm of MS-PSO-BP (Mathematical Statistics, Particle Swarm Optimization, Back Propagation neural network) is proposed to improve the wind power system prediction accuracy. MS is used to optimize artificial neural network training sample, PSO-BP (particle swarm combined with back propagation neural network) is employed on prediction error dynamic revision. From the angle of root mean square error (RMSE), the mean absolute error (MAE) and convergence rate, analysis and comparison of several intelligent algorithms (BP, RBP, PSO-BP, MS-BP, MS-RBP, MS-PSO-BP) are done to verify the availability of the proposed prediction method. Further, due to the physical function of energy storage in improving accuracy of schedule pre-fabrication, a mathematical statistical method is proposed to determine the optimal capacity of the storage batteries in power forecasting based on the historical statistical data of wind farm. Algorithm feasibility is validated by application of experiment simulation and comparative analysis.
Volume: 15
Issue: 4
Page: 1610-1624
Publish at: 2017-12-01

Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style

10.11591/ijece.v7i6.pp3332-3343
Rakesh Ahuja , S. S. Bedi
The proposed scheme implemented a semi blind digital watermarking method for video exploiting MPEG-2 standard. The watermark is inserted into selected high frequency coefficients of plain types of discrete cosine transform blocks instead of edge and texture blocks during intra coding process. The selection is essential because the error in such type of blocks is less sensitive to human eyes as compared to other categories of blocks. Therefore, the perceptibility of watermarked video does not degraded sharply. Visual quality is also maintained as motion vectors used for generating the motion compensated images are untouched during the entire watermarking process. Experimental results revealed that the scheme is not only robust to re-compression attack, spatial synchronization attacks like cropping, rotation but also strong to temporal synchronization attacks like frame inserting, deleting, swapping and averaging. The superiority of the anticipated method is obtaining the best sturdiness results contrast to the recently delivered schemes.
Volume: 7
Issue: 6
Page: 3332-3343
Publish at: 2017-12-01

The Competition Between ISPs in Presence of the Net Neutrality

10.11591/ijict.v6i3.pp166-178
Mohamed El Amrani , Hamid Garmani , Mohamed Baslam , Rachid El Ayachi
In this work, we present an economic model of computer networks that describes the in-teraction between Internet Service Providers (ISP ), customers and content provider. The competition between ISP s may be translated by the prices they require and the qualities of service (QoS) they offer. The customer demand for service from an ISP does not only de-pend on the price and quality of service (QoS) of the ISP , but it is influenced by all those offered by its competitors. This behavior has been extensively analyzed using game the-ory as a decision support tool. We interpret a non-neutral network when a content provider privileges ISP s by offering them more bandwidth to ensure proper QoS to support ap-plications that require more data transport capacity (voice over internet protocol (V OIP ) the live video streaming, online gaming). In addition, our work focuses on the price game analysis and QoS between ISP s in two cases: neutral network and non-neutral network. After showing the existence and uniqueness of equilibrium in terms of quality of service, we analyzed the impact of net neutrality on competition between ISP s. We also validated our theoretical study with numerical results, which show that the game has an equilibrium point which depends on all the parameters of the system.
Volume: 6
Issue: 3
Page: 166-178
Publish at: 2017-12-01

Zakah Management System Using Approach Classification

10.12928/telkomnika.v15i4.5640
Zulfajri Basri; Hasanuddin University, Indonesia Hasanuddin , Syafruddin; Hasanuddin University, Indonesia Syarif , Darniati; Hasanuddin University, Indonesia Darniati
The often problematic faced by Muslims are lack of understanding in calculating Zakah and determining the feasibility of compliant recipients based on Islamic Shari'a. This study aimed to establish Zakah management system to support calculation process based on Al Qaradhawi method, helping Board of Zakah in distributing Zakah funds to mustahik. The algorithm used for the classification of Zakah recipients is Naive Bayes. The classification was combination of discrete and continuous data which is conducted by experiments using feasible and unfeasible data as a novelty approach. The results have shown that the Naive Bayes method could solve the problem with 85% of average.
Volume: 15
Issue: 4
Page: 1852-1857
Publish at: 2017-12-01

A Good Performance OTP Encryption Image based on DCT-DWT Steganography

10.12928/telkomnika.v15i4.5883
Wellia Shinta; Dian Nuswantoro University (UDINUS), Indonesia Sari , Eko Hari; Dian Nuswantoro University (UDINUS), Indonesia Rachmawanto , De Rosal Ignatius Moses; Dian Nuswantoro University (UDINUS), Indonesia Setiadi , Christy Atika; Dian Nuswantoro University (UDINUS), Indonesia Sari
The security aspect is very important in data transmission. One way to secure data is with steganography and cryptography. Surely research on this should continue to be developed to improve security. In this paper, we proposed a combination of steganographic and cryptographic algorithms for double protection during data transmission. The selected steganographic algorithm is the use of a combination of DCT and DWT domain transformations. Because the Imperceptibility aspect is a very important aspect of steganographic techniques, this aspect needs to be greatly improved. In the proposed method of DCT transformation first, proceed with DWT transformation. From the experimental results obtained better imperceptibility quality, compared with existing methods. To add OTP message security applied algorithm to encrypt the message image, before it is inserted. This is evidenced by experiments conducted on 20 grayscale images measuring 512x512 with performance tests using MSE, PSNR, and NC. Experimental results prove that DCT-DWT-OTP generates PNSR more than 50 dB, and NC of all images is 1.
Volume: 15
Issue: 4
Page: 1982-1989
Publish at: 2017-12-01
Show 1375 of 1858

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration